Zum Hauptinhalt springen

Showing 1–42 of 42 results for author: Tak, H

.
  1. arXiv:2408.16179  [pdf, other

    astro-ph.IM

    Six Maxims of Statistical Acumen for Astronomical Data Analysis

    Authors: Hyungsuk Tak, Yang Chen, Vinay L. Kashyap, Kaisey S. Mandel, Xiao-Li Meng, Aneta Siemiginowska, David A. van Dyk

    Abstract: The production of complex astronomical data is accelerating, especially with newer telescopes producing ever more large-scale surveys. The increased quantity, complexity, and variety of astronomical data demand a parallel increase in skill and sophistication in developing, deciding, and deploying statistical methods. Understanding limitations and appreciating nuances in statistical and machine lea… ▽ More

    Submitted 28 August, 2024; originally announced August 2024.

  2. arXiv:2408.08739  [pdf, other

    eess.AS cs.AI cs.SD

    ASVspoof 5: Crowdsourced Speech Data, Deepfakes, and Adversarial Attacks at Scale

    Authors: Xin Wang, Hector Delgado, Hemlata Tak, Jee-weon Jung, Hye-jin Shim, Massimiliano Todisco, Ivan Kukanov, Xuechen Liu, Md Sahidullah, Tomi Kinnunen, Nicholas Evans, Kong Aik Lee, Junichi Yamagishi

    Abstract: ASVspoof 5 is the fifth edition in a series of challenges that promote the study of speech spoofing and deepfake attacks, and the design of detection solutions. Compared to previous challenges, the ASVspoof 5 database is built from crowdsourced data collected from a vastly greater number of speakers in diverse acoustic conditions. Attacks, also crowdsourced, are generated and tested using surrogat… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

    Comments: 8 pages, ASVspoof 5 Workshop (Interspeech2024 Satellite)

  3. arXiv:2407.08016  [pdf, other

    eess.AS cs.SD

    Source Tracing of Audio Deepfake Systems

    Authors: Nicholas Klein, Tianxiang Chen, Hemlata Tak, Ricardo Casal, Elie Khoury

    Abstract: Recent progress in generative AI technology has made audio deepfakes remarkably more realistic. While current research on anti-spoofing systems primarily focuses on assessing whether a given audio sample is fake or genuine, there has been limited attention on discerning the specific techniques to create the audio deepfakes. Algorithms commonly used in audio deepfake generation, like text-to-speech… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: Accepted by INTERSPEECH 2024

  4. arXiv:2406.05339  [pdf, other

    eess.AS cs.AI

    To what extent can ASV systems naturally defend against spoofing attacks?

    Authors: Jee-weon Jung, Xin Wang, Nicholas Evans, Shinji Watanabe, Hye-jin Shim, Hemlata Tak, Sidhhant Arora, Junichi Yamagishi, Joon Son Chung

    Abstract: The current automatic speaker verification (ASV) task involves making binary decisions on two types of trials: target and non-target. However, emerging advancements in speech generation technology pose significant threats to the reliability of ASV systems. This study investigates whether ASV effortlessly acquires robustness against spoofing attacks (i.e., zero-shot capability) by systematically ex… ▽ More

    Submitted 14 June, 2024; v1 submitted 7 June, 2024; originally announced June 2024.

    Comments: 5 pages, 3 figures, 3 tables, Interspeech 2024

  5. arXiv:2406.03512  [pdf, other

    cs.SD cs.AI eess.AS

    Harder or Different? Understanding Generalization of Audio Deepfake Detection

    Authors: Nicolas M. Müller, Nicholas Evans, Hemlata Tak, Philip Sperl, Konstantin Böttinger

    Abstract: Recent research has highlighted a key issue in speech deepfake detection: models trained on one set of deepfakes perform poorly on others. The question arises: is this due to the continuously improving quality of Text-to-Speech (TTS) models, i.e., are newer DeepFakes just 'harder' to detect? Or, is it because deepfakes generated with one model are fundamentally different to those generated using a… ▽ More

    Submitted 12 June, 2024; v1 submitted 5 June, 2024; originally announced June 2024.

    Journal ref: Interspeech 2024

  6. Mapping the Growth of Supermassive Black Holes as a Function of Galaxy Stellar Mass and Redshift

    Authors: Fan Zou, Zhibo Yu, W. N. Brandt, Hyungsuk Tak, Guang Yang, Qingling Ni

    Abstract: The growth of supermassive black holes is strongly linked to their galaxies. It has been shown that the population mean black-hole accretion rate ($\overline{\mathrm{BHAR}}$) primarily correlates with the galaxy stellar mass ($M_\star$) and redshift for the general galaxy population. This work aims to provide the best measurements of $\overline{\mathrm{BHAR}}$ as a function of $M_\star$ and redshi… ▽ More

    Submitted 29 March, 2024; originally announced April 2024.

    Comments: 25 pages, 12 figures, 1 table. Published in ApJ

    Journal ref: ApJ, 964, 183 (2024)

  7. arXiv:2403.04607  [pdf, other

    math.ST astro-ph.IM stat.CO stat.ML

    Repelling-Attracting Hamiltonian Monte Carlo

    Authors: Siddharth Vishwanath, Hyungsuk Tak

    Abstract: We propose a variant of Hamiltonian Monte Carlo (HMC), called the Repelling-Attracting Hamiltonian Monte Carlo (RAHMC), for sampling from multimodal distributions. The key idea that underpins RAHMC is a departure from the conservative dynamics of Hamiltonian systems, which form the basis of traditional HMC, and turning instead to the dissipative dynamics of conformal Hamiltonian systems. In partic… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

    Comments: 41 pages, 10 figures, 4 tables

    MSC Class: 62-08

  8. arXiv:2309.12237  [pdf, other

    cs.CR cs.LG cs.SD eess.AS eess.IV stat.CO

    t-EER: Parameter-Free Tandem Evaluation of Countermeasures and Biometric Comparators

    Authors: Tomi Kinnunen, Kong Aik Lee, Hemlata Tak, Nicholas Evans, Andreas Nautsch

    Abstract: Presentation attack (spoofing) detection (PAD) typically operates alongside biometric verification to improve reliablity in the face of spoofing attacks. Even though the two sub-systems operate in tandem to solve the single task of reliable biometric verification, they address different detection tasks and are hence typically evaluated separately. Evidence shows that this approach is suboptimal. W… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: To appear in IEEE Transactions on Pattern Analysis and Machine Intelligence. For associated codes, see https://github.com/TakHemlata/T-EER (Github) and https://colab.research.google.com/drive/1ga7eiKFP11wOFMuZjThLJlkBcwEG6_4m?usp=sharing (Google Colab)

  9. arXiv:2308.13018  [pdf, other

    stat.AP astro-ph.IM

    A Robust Bayesian Meta-Analysis for Estimating the Hubble Constant via Time Delay Cosmography

    Authors: Hyungsuk Tak, Xuheng Ding

    Abstract: We propose a Bayesian meta-analysis to infer the current expansion rate of the Universe, called the Hubble constant ($H_0$), via time delay cosmography. Inputs of the meta-analysis are estimates of two properties for each pair of gravitationally lensed images; time delay and Fermat potential difference estimates with their standard errors. A meta-analysis can be appealing in practice because obtai… ▽ More

    Submitted 16 July, 2024; v1 submitted 24 August, 2023; originally announced August 2023.

  10. arXiv:2306.07655  [pdf, other

    eess.AS cs.CR cs.LG

    Malafide: a novel adversarial convolutive noise attack against deepfake and spoofing detection systems

    Authors: Michele Panariello, Wanying Ge, Hemlata Tak, Massimiliano Todisco, Nicholas Evans

    Abstract: We present Malafide, a universal adversarial attack against automatic speaker verification (ASV) spoofing countermeasures (CMs). By introducing convolutional noise using an optimised linear time-invariant filter, Malafide attacks can be used to compromise CM reliability while preserving other speech attributes such as quality and the speaker's voice. In contrast to other adversarial attacks propos… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

    Comments: Accepted at INTERSPEECH 2023

  11. arXiv:2305.19051  [pdf, other

    eess.AS cs.AI cs.SD

    Towards single integrated spoofing-aware speaker verification embeddings

    Authors: Sung Hwan Mun, Hye-jin Shim, Hemlata Tak, Xin Wang, Xuechen Liu, Md Sahidullah, Myeonghun Jeong, Min Hyun Han, Massimiliano Todisco, Kong Aik Lee, Junichi Yamagishi, Nicholas Evans, Tomi Kinnunen, Nam Soo Kim, Jee-weon Jung

    Abstract: This study aims to develop a single integrated spoofing-aware speaker verification (SASV) embeddings that satisfy two aspects. First, rejecting non-target speakers' input as well as target speakers' spoofed inputs should be addressed. Second, competitive performance should be demonstrated compared to the fusion of automatic speaker verification (ASV) and countermeasure (CM) embeddings, which outpe… ▽ More

    Submitted 1 June, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: Accepted by INTERSPEECH 2023. Code and models are available in https://github.com/sasv-challenge/ASVSpoof5-SASVBaseline

  12. arXiv:2303.07073  [pdf, other

    eess.AS

    Can spoofing countermeasure and speaker verification systems be jointly optimised?

    Authors: Wanying Ge, Hemlata Tak, Massimiliano Todisco, Nicholas Evans

    Abstract: Spoofing countermeasure (CM) and automatic speaker verification (ASV) sub-systems can be used in tandem with a backend classifier as a solution to the spoofing aware speaker verification (SASV) task. The two sub-systems are typically trained independently to solve different tasks. While our previous work demonstrated the potential of joint optimisation, it also showed a tendency to over-fit to spe… ▽ More

    Submitted 20 December, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

    Comments: Accepted to ICASSP 2023

  13. arXiv:2302.04703  [pdf, other

    astro-ph.IM stat.AP

    Practical Guidance for Bayesian Inference in Astronomy

    Authors: Gwendolyn M. Eadie, Joshua S. Speagle, Jessi Cisewski-Kehe, Daniel Foreman-Mackey, Daniela Huppenkothen, David E. Jones, Aaron Springford, Hyungsuk Tak

    Abstract: In the last two decades, Bayesian inference has become commonplace in astronomy. At the same time, the choice of algorithms, terminology, notation, and interpretation of Bayesian inference varies from one sub-field of astronomy to the next, which can lead to confusion to both those learning and those familiar with Bayesian statistics. Moreover, the choice varies between the astronomy and statistic… ▽ More

    Submitted 9 February, 2023; originally announced February 2023.

    Comments: 10 pages, 4 figures

  14. arXiv:2209.00506  [pdf, other

    eess.AS

    On the potential of jointly-optimised solutions to spoofing attack detection and automatic speaker verification

    Authors: Wanying Ge, Hemlata Tak, Massimiliano Todisco, Nicholas Evans

    Abstract: The spoofing-aware speaker verification (SASV) challenge was designed to promote the study of jointly-optimised solutions to accomplish the traditionally separately-optimised tasks of spoofing detection and speaker verification. Jointly-optimised systems have the potential to operate in synergy as a better performing solution to the single task of reliable speaker verification. However, none of th… ▽ More

    Submitted 7 October, 2022; v1 submitted 1 September, 2022; originally announced September 2022.

    Comments: Accepted to IberSPEECH 2022 Conference

  15. arXiv:2207.09327  [pdf

    astro-ph.IM stat.AP

    TD-CARMA: Painless, accurate, and scalable estimates of gravitational-lens time delays with flexible CARMA processes

    Authors: Antoine D. Meyer, David A. van Dyk, Hyungsuk Tak, Aneta Siemiginowska

    Abstract: Cosmological parameters encoding our understanding of the expansion history of the Universe can be constrained by the accurate estimation of time delays arising in gravitationally lensed systems. We propose TD-CARMA, a Bayesian method to estimate cosmological time delays by modelling the observed and irregularly sampled light curves as realizations of a Continuous Auto-Regressive Moving Average (C… ▽ More

    Submitted 9 June, 2023; v1 submitted 19 July, 2022; originally announced July 2022.

  16. arXiv:2204.09976  [pdf, other

    cs.SD eess.AS

    Baseline Systems for the First Spoofing-Aware Speaker Verification Challenge: Score and Embedding Fusion

    Authors: Hye-jin Shim, Hemlata Tak, Xuechen Liu, Hee-Soo Heo, Jee-weon Jung, Joon Son Chung, Soo-Whan Chung, Ha-Jin Yu, Bong-Jin Lee, Massimiliano Todisco, Héctor Delgado, Kong Aik Lee, Md Sahidullah, Tomi Kinnunen, Nicholas Evans

    Abstract: Deep learning has brought impressive progress in the study of both automatic speaker verification (ASV) and spoofing countermeasures (CM). Although solutions are mutually dependent, they have typically evolved as standalone sub-systems whereby CM solutions are usually designed for a fixed ASV system. The work reported in this paper aims to gauge the improvements in reliability that can be gained f… ▽ More

    Submitted 21 April, 2022; originally announced April 2022.

    Comments: 8 pages, accepted by Odyssey 2022

  17. arXiv:2203.14732  [pdf, other

    eess.AS

    SASV 2022: The First Spoofing-Aware Speaker Verification Challenge

    Authors: Jee-weon Jung, Hemlata Tak, Hye-jin Shim, Hee-Soo Heo, Bong-Jin Lee, Soo-Whan Chung, Ha-Jin Yu, Nicholas Evans, Tomi Kinnunen

    Abstract: The first spoofing-aware speaker verification (SASV) challenge aims to integrate research efforts in speaker verification and anti-spoofing. We extend the speaker verification scenario by introducing spoofed trials to the usual set of target and impostor trials. In contrast to the established ASVspoof challenge where the focus is upon separate, independently optimised spoofing detection and speake… ▽ More

    Submitted 28 March, 2022; originally announced March 2022.

    Comments: 5 pages, 2 figures, 2 tables, submitted to Interspeech 2022 as a conference paper

  18. arXiv:2202.12233  [pdf, other

    eess.AS cs.SD

    Automatic speaker verification spoofing and deepfake detection using wav2vec 2.0 and data augmentation

    Authors: Hemlata Tak, Massimiliano Todisco, Xin Wang, Jee-weon Jung, Junichi Yamagishi, Nicholas Evans

    Abstract: The performance of spoofing countermeasure systems depends fundamentally upon the use of sufficiently representative training data. With this usually being limited, current solutions typically lack generalisation to attacks encountered in the wild. Strategies to improve reliability in the face of uncontrolled, unpredictable attacks are hence needed. We report in this paper our efforts to use self-… ▽ More

    Submitted 28 February, 2022; v1 submitted 24 February, 2022; originally announced February 2022.

    Comments: Submitted to Speaker Odyssey Workshop 2022

  19. arXiv:2201.10283  [pdf, ps, other

    cs.SD cs.CR eess.AS

    SASV Challenge 2022: A Spoofing Aware Speaker Verification Challenge Evaluation Plan

    Authors: Jee-weon Jung, Hemlata Tak, Hye-jin Shim, Hee-Soo Heo, Bong-Jin Lee, Soo-Whan Chung, Hong-Goo Kang, Ha-Jin Yu, Nicholas Evans, Tomi Kinnunen

    Abstract: ASV (automatic speaker verification) systems are intrinsically required to reject both non-target (e.g., voice uttered by different speaker) and spoofed (e.g., synthesised or converted) inputs. However, there is little consideration for how ASV systems themselves should be adapted when they are expected to encounter spoofing attacks, nor when they operate in tandem with CMs (spoofing countermeasur… ▽ More

    Submitted 2 March, 2022; v1 submitted 25 January, 2022; originally announced January 2022.

    Comments: Evaluation plan of the SASV Challenge 2022. See this webpage for more information: https://sasv-challenge.github.io

  20. arXiv:2112.06831  [pdf, other

    astro-ph.IM stat.ME

    Incorporating Measurement Error in Astronomical Object Classification

    Authors: Sarah Shy, Hyungsuk Tak, Eric D. Feigelson, John D. Timlin, G. Jogesh Babu

    Abstract: Most general-purpose classification methods, such as support-vector machine (SVM) and random forest (RF), fail to account for an unusual characteristic of astronomical data: known measurement error uncertainties. In astronomical data, this information is often given in the data but discarded because popular machine learning classifiers cannot incorporate it. We propose a simulation-based approach… ▽ More

    Submitted 2 May, 2022; v1 submitted 13 December, 2021; originally announced December 2021.

    Journal ref: The Astronomical Journal, 164 (1), 6, 2022

  21. arXiv:2111.04433  [pdf, other

    eess.AS cs.CR cs.SD eess.SP

    RawBoost: A Raw Data Boosting and Augmentation Method applied to Automatic Speaker Verification Anti-Spoofing

    Authors: Hemlata Tak, Madhu Kamble, Jose Patino, Massimiliano Todisco, Nicholas Evans

    Abstract: This paper introduces RawBoost, a data boosting and augmentation method for the design of more reliable spoofing detection solutions which operate directly upon raw waveform inputs. While RawBoost requires no additional data sources, e.g. noise recordings or impulse responses and is data, application and model agnostic, it is designed for telephony scenarios. Based upon the combination of linear a… ▽ More

    Submitted 22 February, 2022; v1 submitted 8 November, 2021; originally announced November 2021.

    Comments: Accepted to IEEE ICASSP 2022

  22. arXiv:2110.01200  [pdf, other

    eess.AS cs.AI cs.LG

    AASIST: Audio Anti-Spoofing using Integrated Spectro-Temporal Graph Attention Networks

    Authors: Jee-weon Jung, Hee-Soo Heo, Hemlata Tak, Hye-jin Shim, Joon Son Chung, Bong-Jin Lee, Ha-Jin Yu, Nicholas Evans

    Abstract: Artefacts that differentiate spoofed from bona-fide utterances can reside in spectral or temporal domains. Their reliable detection usually depends upon computationally demanding ensemble systems where each subsystem is tuned to some specific artefacts. We seek to develop an efficient, single system that can detect a broad range of different spoofing attacks without score-level ensembles. We propo… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

    Comments: 5 pages, 1 figure, 3 tables, submitted to ICASSP2022

  23. arXiv:2107.12710  [pdf, other

    eess.AS cs.SD

    End-to-End Spectro-Temporal Graph Attention Networks for Speaker Verification Anti-Spoofing and Speech Deepfake Detection

    Authors: Hemlata Tak, Jee-weon Jung, Jose Patino, Madhu Kamble, Massimiliano Todisco, Nicholas Evans

    Abstract: Artefacts that serve to distinguish bona fide speech from spoofed or deepfake speech are known to reside in specific subbands and temporal segments. Various approaches can be used to capture and model such artefacts, however, none works well across a spectrum of diverse spoofing attacks. Reliable detection then often depends upon the fusion of multiple detection systems, each tuned to detect diffe… ▽ More

    Submitted 23 August, 2021; v1 submitted 27 July, 2021; originally announced July 2021.

    Comments: Accepted in ASVspoof 2021 Workshop

  24. arXiv:2104.03654  [pdf, other

    eess.AS cs.CR cs.SD

    Graph Attention Networks for Anti-Spoofing

    Authors: Hemlata Tak, Jee-weon Jung, Jose Patino, Massimiliano Todisco, Nicholas Evans

    Abstract: The cues needed to detect spoofing attacks against automatic speaker verification are often located in specific spectral sub-bands or temporal segments. Previous works show the potential to learn these using either spectral or temporal self-attention mechanisms but not the relationships between neighbouring sub-bands or segments. This paper reports our use of graph attention networks (GATs) to mod… ▽ More

    Submitted 8 April, 2021; originally announced April 2021.

    Comments: Submitted to INTERSPEECH 2021

  25. arXiv:2011.01108  [pdf, ps, other

    eess.AS

    End-to-end anti-spoofing with RawNet2

    Authors: Hemlata Tak, Jose Patino, Massimiliano Todisco, Andreas Nautsch, Nicholas Evans, Anthony Larcher

    Abstract: Spoofing countermeasures aim to protect automatic speaker verification systems from attempts to manipulate their reliability with the use of spoofed speech signals. While results from the most recent ASVspoof 2019 evaluation show great potential to detect most forms of attack, some continue to evade detection. This paper reports the first application of RawNet2 to anti-spoofing. RawNet2 ingests ra… ▽ More

    Submitted 16 December, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Accepted to ICASSP 2021

  26. arXiv:2006.08619  [pdf, other

    astro-ph.CO astro-ph.GA astro-ph.IM

    Time Delay Lens Modelling Challenge

    Authors: X. Ding, T. Treu, S. Birrer, G. C. -F. Chen, J. Coles, P. Denzel, M. Frigo A. Galan, P. J. Marshall, M. Millon, A. More, A. J. Shajib, D. Sluse, H. Tak, D. Xu, M. W. Auger, V. Bonvin, H. Chand, F. Courbin, G. Despali, C. D. Fassnacht, D. Gilman, S. Hilbert, S. R. Kumar, Y. -Y. Lin, J. W. Park , et al. (4 additional authors not shown)

    Abstract: In recent years, breakthroughs in methods and data have enabled gravitational time delays to emerge as a very powerful tool to measure the Hubble constant $H_0$. However, published state-of-the-art analyses require of order 1 year of expert investigator time and up to a million hours of computing time per system. Furthermore, as precision improves, it is crucial to identify and mitigate systematic… ▽ More

    Submitted 17 February, 2021; v1 submitted 15 June, 2020; originally announced June 2020.

    Comments: 23 pages, 12 figures, 6 tables, MNRAS accepted

    Journal ref: MNRAS, (2021), 503, 1096

  27. arXiv:2005.10393  [pdf, other

    eess.AS cs.SD

    Spoofing Attack Detection using the Non-linear Fusion of Sub-band Classifiers

    Authors: Hemlata Tak, Jose Patino, Andreas Nautsch, Nicholas Evans, Massimiliano Todisco

    Abstract: The threat of spoofing can pose a risk to the reliability of automatic speaker verification. Results from the bi-annual ASVspoof evaluations show that effective countermeasures demand front-ends designed specifically for the detection of spoofing artefacts. Given the diversity in spoofing attacks, ensemble methods are particularly effective. The work in this paper shows that a bank of very simple… ▽ More

    Submitted 20 May, 2020; originally announced May 2020.

    Comments: Submitted to Interspeech 2020 conference, 5 pages

  28. arXiv:2005.08049  [pdf, other

    astro-ph.IM stat.ME

    Modeling Stochastic Variability in Multi-Band Time Series Data

    Authors: Zhirui Hu, Hyungsuk Tak

    Abstract: In preparation for the era of the time-domain astronomy with upcoming large-scale surveys, we propose a state-space representation of a multivariate damped random walk process as a tool to analyze irregularly-spaced multi-filter light curves with heteroscedastic measurement errors. We adopt a computationally efficient and scalable Kalman-filtering approach to evaluate the likelihood function, lead… ▽ More

    Submitted 6 September, 2020; v1 submitted 16 May, 2020; originally announced May 2020.

  29. arXiv:2004.06422  [pdf, other

    eess.AS cs.SD

    An explainability study of the constant Q cepstral coefficient spoofing countermeasure for automatic speaker verification

    Authors: Hemlata Tak, Jose Patino, Andreas Nautsch, Nicholas Evans, Massimiliano Todisco

    Abstract: Anti-spoofing for automatic speaker verification is now a well established area of research, with three competitive challenges having been held in the last 6 years. A great deal of research effort over this time has been invested into the development of front-end representations tailored to the spoofing detection task. One such approach known as constant Q cepstral coefficients (CQCCs) have been s… ▽ More

    Submitted 19 April, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: Accepted to Speaker Odyssey (The Speaker and Language Recognition Workshop), 2020, 8 pages

  30. Data transforming augmentation for heteroscedastic models

    Authors: Hyungsuk Tak, Kisung You, Sujit K. Ghosh, Bingyue Su, Joseph Kelly

    Abstract: Data augmentation (DA) turns seemingly intractable computational problems into simple ones by augmenting latent missing data. In addition to computational simplicity, it is now well-established that DA equipped with a deterministic transformation can improve the convergence speed of iterative algorithms such as an EM algorithm or Gibbs sampler. In this article, we outline a framework for the trans… ▽ More

    Submitted 27 January, 2020; v1 submitted 6 November, 2019; originally announced November 2019.

  31. arXiv:1806.03638  [pdf, other

    math.PR math-ph math.CV

    Conformal field theory for annulus SLE: partition functions and martingale-observables

    Authors: Sung-Soo Byun, Nam-Gyu Kang, Hee-Joon Tak

    Abstract: We implement a version of conformal field theory in a doubly connected domain to connect it to the theory of annulus SLE of various types, including the standard annulus SLE, the reversible annulus SLE, and the annulus SLE with several force points. This implementation considers the statistical fields generated under the OPE multiplication by the Gaussian free field and its central/background char… ▽ More

    Submitted 18 July, 2021; v1 submitted 10 June, 2018; originally announced June 2018.

    Comments: 60 pages, 5 figures

  32. How proper are Bayesian models in the astronomical literature?

    Authors: Hyungsuk Tak, Sujit K. Ghosh, Justin A. Ellis

    Abstract: The well-known Bayes theorem assumes that a posterior distribution is a probability distribution. However, the posterior distribution may no longer be a probability distribution if an improper prior distribution (non-probability measure) such as an unbounded uniform prior is used. Improper priors are often used in the astronomical literature to reflect a lack of prior knowledge, but checking wheth… ▽ More

    Submitted 22 August, 2018; v1 submitted 10 December, 2017; originally announced December 2017.

  33. Robust and Accurate Inference via a Mixture of Gaussian and Student's t Errors

    Authors: Hyungsuk Tak, Justin A. Ellis, Sujit K. Ghosh

    Abstract: A Gaussian measurement error assumption, i.e., an assumption that the data are observed up to Gaussian noise, can bias any parameter estimation in the presence of outliers. A heavy tailed error assumption based on Student's t distribution helps reduce the bias. However, it may be less efficient in estimating parameters if the heavy tailed assumption is uniformly applied to all of the data when mos… ▽ More

    Submitted 17 August, 2018; v1 submitted 10 July, 2017; originally announced July 2017.

  34. Rapid Optical Variations Correlated with X-rays in the 2015 Second Outburst of V404 Cygni (GS 2023$+$338)

    Authors: Mariko Kimura, Taichi Kato, Keisuke Isogai, Hyungsuk Tak, Megumi Shidatsu, Hiroshi Itoh, Tamás Tordai, Kiyoshi Kasai, William Goff, Seiichiro Kiyota, Roger D. Pickard, Katsura Matsumoto, Naoto Kojiguchi, Yuki Sugiura, Eiji Yamada, Taiki Tatsumi, Atsushi Miyashita, Pavol A. Dubovsky, Igor Kudzej, Enrique de Miguel, William L. Stein, Yutaka Maeda, Elena P. Pavlenko, Aleksei A. Sosnovskij, Julia V. Babina , et al. (2 additional authors not shown)

    Abstract: We present optical multi-colour photometry of V404 Cyg during the outburst from December, 2015 to January, 2016 together with the simultaneous X-ray data. This outburst occurred less than 6 months after the previous outburst in June-July, 2015. These two outbursts in 2015 were of a slow rise and rapid decay-type and showed large-amplitude ($\sim$2 mag) and short-term ($\sim$10 min-3 hours) optical… ▽ More

    Submitted 2 January, 2018; v1 submitted 21 June, 2017; originally announced June 2017.

    Comments: 14 pages, 8 figures, Accepted for publication in MNRAS (includes supplementary information), plus an erratum

  35. Frequency Coverage Properties of a Uniform Shrinkage Prior Distribution

    Authors: Hyungsuk Tak

    Abstract: A uniform shrinkage prior (USP) distribution on the unknown variance component of a random-effects model is known to produce good frequency properties. The USP has a parameter that determines the shape of its density function, but it has been neglected whether the USP can maintain such good frequency properties regardless of the choice for the shape parameter. We investigate which choice for the s… ▽ More

    Submitted 12 December, 2016; originally announced December 2016.

    Journal ref: Journal of Statistical Computation and Simulation, 87 (15), 2929-2939, 2017

  36. Rgbp: An R Package for Gaussian, Poisson, and Binomial Random Effects Models with Frequency Coverage Evaluations

    Authors: Hyungsuk Tak, Joseph Kelly, Carl N. Morris

    Abstract: Rgbp is an R package that provides estimates and verifiable confidence intervals for random effects in two-level conjugate hierarchical models for overdispersed Gaussian, Poisson, and Binomial data. Rgbp models aggregate data from k independent groups summarized by observed sufficient statistics for each random effect, such as sample means, possibly with covariates. Rgbp uses approximate Bayesian… ▽ More

    Submitted 5 December, 2016; originally announced December 2016.

    Journal ref: Journal of Statistical Software, 78, 5, 1-33 (2017)

  37. arXiv:1602.01462  [pdf, other

    astro-ph.IM astro-ph.CO stat.AP

    Bayesian Estimates of Astronomical Time Delays between Gravitationally Lensed Stochastic Light Curves

    Authors: Hyungsuk Tak, Kaisey Mandel, David A. van Dyk, Vinay L. Kashyap, Xiao-Li Meng, Aneta Siemiginowska

    Abstract: The gravitational field of a galaxy can act as a lens and deflect the light emitted by a more distant object such as a quasar. Strong gravitational lensing causes multiple images of the same quasar to appear in the sky. Since the light in each gravitationally lensed image traverses a different path length from the quasar to the Earth, fluctuations in the source brightness are observed in the sever… ▽ More

    Submitted 30 January, 2017; v1 submitted 2 February, 2016; originally announced February 2016.

    Comments: Accepted for publication in the Annals of Applied Statistics

    Journal ref: The Annals of Applied Statistics, 2017, 11 (3), 1309-1348

  38. A Repelling-Attracting Metropolis Algorithm for Multimodality

    Authors: Hyungsuk Tak, Xiao-Li Meng, David A. van Dyk

    Abstract: Although the Metropolis algorithm is simple to implement, it often has difficulties exploring multimodal distributions. We propose the repelling-attracting Metropolis (RAM) algorithm that maintains the simple-to-implement nature of the Metropolis algorithm, but is more likely to jump between modes. The RAM algorithm is a Metropolis-Hastings algorithm with a proposal that consists of a downhill mov… ▽ More

    Submitted 20 October, 2017; v1 submitted 21 January, 2016; originally announced January 2016.

  39. Data-dependent Posterior Propriety of Bayesian Beta-Binomial-Logit Model

    Authors: Hyungsuk Tak, Carl N. Morris

    Abstract: A Beta-Binomial-Logit model is a Beta-Binomial model with covariate information incorporated via a logistic regression. Posterior propriety of a Bayesian Beta-Binomial-Logit model can be data-dependent for improper hyper-prior distributions. Various researchers in the literature have unknowingly used improper posterior distributions or have given incorrect statements about posterior propriety beca… ▽ More

    Submitted 22 December, 2015; originally announced December 2015.

    Journal ref: Bayesian Analysis (2017) 12, 2, 533-555

  40. arXiv:1409.1254  [pdf, other

    astro-ph.IM astro-ph.CO

    Strong Lens Time Delay Challenge: II. Results of TDC1

    Authors: Kai Liao, Tommaso Treu, Phil Marshall, Christopher D. Fassnacht, Nick Rumbaugh, Gregory Dobler, Amir Aghamousa, Vivien Bonvin, Frederic Courbin, Alireza Hojjati, Neal Jackson, Vinay Kashyap, S. Rathna Kumar, Eric Linder, Kaisey Mandel, Xiao-Li Meng, Georges Meylan, Leonidas A. Moustakas, Tushar P. Prabhu, Andrew Romero-Wolf, Arman Shafieloo, Aneta Siemiginowska, Chelliah S. Stalin, Hyungsuk Tak, Malte Tewes , et al. (1 additional authors not shown)

    Abstract: We present the results of the first strong lens time delay challenge. The motivation, experimental design, and entry level challenge are described in a companion paper. This paper presents the main challenge, TDC1, which consisted of analyzing thousands of simulated light curves blindly. The observational properties of the light curves cover the range in quality obtained for current targeted effor… ▽ More

    Submitted 11 December, 2014; v1 submitted 3 September, 2014; originally announced September 2014.

    Comments: referee's comments incorporated; to appear in ApJ

    Journal ref: 2015, ApJ, 800, 11

  41. arXiv:1408.6879  [pdf, ps, other

    math.OC

    Periodically time-varying memory static output feedback control design for discrete-time LTI systems

    Authors: Dong Hwan Lee, Young Hoon Joo, Myung Hwan Tak

    Abstract: This paper addresses the problem of static output feedback (SOF) stabilization for discrete-time LTI systems. We approach this problem using the recently developed periodically time-varying memory state-feedback controller (PTVMSFC) design scheme. A bilinear matrix inequality (BMI) condition which uses a pre-designed PTVMSFC is developed to design the periodically time-varying memory SOF controlle… ▽ More

    Submitted 28 August, 2014; originally announced August 2014.

    Comments: This paper has been submitted as a supplemental document of "Periodically time-varying memory static output feedback control design for discrete-time LTI systems" submitted to Automatica

  42. arXiv:1307.4424  [pdf, ps, other

    math.PR math-ph math.CV

    Conformal field theory of dipolar SLE with the Dirichlet boundary condition

    Authors: Nam-Gyu Kang, Hee-Joon Tak

    Abstract: We develop a version of dipolar conformal field theory based on the central charge modification of the Gaussian free field with the Dirichlet boundary condition and prove that correlators of certain family of fields in this theory are martingale-observables for dipolar SLE. We prove the restriction property of dipolar SLE(8/3) and Friedrich-Werner's formula in the dipolar case.

    Submitted 16 July, 2013; originally announced July 2013.

    Comments: To appear in Anal. Math. Phys. 36 pages

    MSC Class: Primary 60J67; 81T40; Secondary 30C35