Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Chong, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.09512  [pdf, other

    cs.SD eess.AS

    MLAAD: The Multi-Language Audio Anti-Spoofing Dataset

    Authors: Nicolas M. Müller, Piotr Kawa, Wei Herng Choong, Edresson Casanova, Eren Gölge, Thorsten Müller, Piotr Syga, Philip Sperl, Konstantin Böttinger

    Abstract: Text-to-Speech (TTS) technology brings significant advantages, such as giving a voice to those with speech impairments, but also enables audio deepfakes and spoofs. The former mislead individuals and may propagate misinformation, while the latter undermine voice biometric security systems. AI-based detection can help to address these challenges by automatically differentiating between genuine and… ▽ More

    Submitted 16 April, 2024; v1 submitted 17 January, 2024; originally announced January 2024.

    Comments: IJCNN 2024

  2. arXiv:2308.16763  [pdf, other

    cs.CL cs.AI

    Ladder-of-Thought: Using Knowledge as Steps to Elevate Stance Detection

    Authors: Kairui Hu, Ming Yan, Joey Tianyi Zhou, Ivor W. Tsang, Wen Haw Chong, Yong Keong Yap

    Abstract: Stance detection aims to identify the attitude expressed in a document towards a given target. Techniques such as Chain-of-Thought (CoT) prompting have advanced this task, enhancing a model's reasoning capabilities through the derivation of intermediate rationales. However, CoT relies primarily on a model's pre-trained internal knowledge during reasoning, thereby neglecting the valuable external i… ▽ More

    Submitted 7 September, 2023; v1 submitted 31 August, 2023; originally announced August 2023.

    Comments: 5 pages, 2 figures, 2 tables

  3. arXiv:2304.08924  [pdf, other

    cs.CV cs.LG

    Quantum Annealing for Single Image Super-Resolution

    Authors: Han Yao Choong, Suryansh Kumar, Luc Van Gool

    Abstract: This paper proposes a quantum computing-based algorithm to solve the single image super-resolution (SISR) problem. One of the well-known classical approaches for SISR relies on the well-established patch-wise sparse modeling of the problem. Yet, this field's current state of affairs is that deep neural networks (DNNs) have demonstrated far superior results than traditional approaches. Nevertheless… ▽ More

    Submitted 18 April, 2023; originally announced April 2023.

    Comments: Accepted to IEEE/CVF CVPR 2023, NTIRE Challenge and Workshop. Draft info: 10 pages, 6 Figures, 2 Tables

  4. arXiv:2301.03829  [pdf, other

    cs.LG cs.AI cs.CV cs.DB cs.MM

    From Plate to Prevention: A Dietary Nutrient-aided Platform for Health Promotion in Singapore

    Authors: Kaiping Zheng, Thao Nguyen, Jesslyn Hwei Sing Chong, Charlene Enhui Goh, Melanie Herschel, Hee Hoon Lee, Changshuo Liu, Beng Chin Ooi, Wei Wang, James Yip

    Abstract: Singapore has been striving to improve the provision of healthcare services to her people. In this course, the government has taken note of the deficiency in regulating and supervising people's nutrient intake, which is identified as a contributing factor to the development of chronic diseases. Consequently, this issue has garnered significant attention. In this paper, we share our experience in a… ▽ More

    Submitted 28 March, 2023; v1 submitted 10 January, 2023; originally announced January 2023.

  5. arXiv:2212.00206  [pdf, other

    cs.LG

    Clustering and Analysis of GPS Trajectory Data using Distance-based Features

    Authors: Zann Koh, Yuren Zhou, Billy Pik Lik Lau, Ran Liu, Keng Hua Chong, Chau Yuen

    Abstract: The proliferation of smartphones has accelerated mobility studies by largely increasing the type and volume of mobility data available. One such source of mobility data is from GPS technology, which is becoming increasingly common and helps the research community understand mobility patterns of people. However, there lacks a standardized framework for studying the different mobility patterns creat… ▽ More

    Submitted 30 November, 2022; originally announced December 2022.

    Comments: 13 pages, 12 figures. To be published in IEEE Access

  6. Jack and Masters of all Trades: One-Pass Learning Sets of Model Sets From Large Pre-Trained Models

    Authors: Han Xiang Choong, Yew-Soon Ong, Abhishek Gupta, Caishun Chen, Ray Lim

    Abstract: For deep learning, size is power. Massive neural nets trained on broad data for a spectrum of tasks are at the forefront of artificial intelligence. These large pre-trained models or Jacks of All Trades (JATs), when fine-tuned for downstream tasks, are gaining importance in driving deep learning advancements. However, environments with tight resource constraints, changing objectives and intentions… ▽ More

    Submitted 21 June, 2024; v1 submitted 2 May, 2022; originally announced May 2022.

    Comments: This article has been published in the IEEE Computational Intelligence Magazine. We have updated the article's Title, Authors, and Abstract in the latest version

    Journal ref: IEEE Computational Intelligence Magazine, 2023, volume 18, no. 3, pp. 29-40

  7. arXiv:2203.16745   

    cs.IT

    Channel Measurement and Characterization with Modified SAGE Algorithm in an Indoor Corridor at 300 GHz

    Authors: Li Yuanbo, Wang Yiqin, Chen Yi, Yu Ziming, Han Chong

    Abstract: The much higher frequencies in the Terahertz (THz) band prevent the effective utilization of channel models dedicated for microwave or millimeter-wave frequency bands. In this paper, a measurement campaign is conducted in an indoor corridor scenario at 306-321 GHz with a frequency-domain Vector Network Analyzer (VNA)-based sounder. To realize high-resolution multipath component (MPC) extraction fo… ▽ More

    Submitted 14 March, 2023; v1 submitted 30 March, 2022; originally announced March 2022.

    Comments: Please find the latest version as arXiv:2212.11756

  8. arXiv:2110.08812  [pdf

    eess.IV cs.CV cs.LG

    Rheumatoid Arthritis: Automated Scoring of Radiographic Joint Damage

    Authors: Yan Ming Tan, Raphael Quek Hao Chong, Carol Anne Hargreaves

    Abstract: Rheumatoid arthritis is an autoimmune disease that causes joint damage due to inflammation in the soft tissue lining the joints known as the synovium. It is vital to identify joint damage as soon as possible to provide necessary treatment early and prevent further damage to the bone structures. Radiographs are often used to assess the extent of the joint damage. Currently, the scoring of joint dam… ▽ More

    Submitted 17 October, 2021; originally announced October 2021.

  9. arXiv:2109.02907  [pdf

    cs.NI

    A P2P Network Topology for Optimizing Partition Tolerance to Reach the CAP Guarantee Bound in Consortium Blockchains

    Authors: Han Wang, Hui Li, Zixian Wang, Baofu Han, Minglong Zhang, Peter Han Joo Chong, Xiaoli Chu, Yang Liu, Soung-Yue Liew, Lunchakorn Wuttisittikulkij

    Abstract: Decentralized cryptocurrency systems, known as blockchains, have shown promise as infrastructure for mutually distrustful parties to agree on transactions safely. However, Bitcoin-derived blockchains and their variants suffer from the limitations of the CAP Trilemma, which is difficult to be solved through optimizing consensus protocols. Moreover, the P2P network of blockchains have problems in ef… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 13 pages, 11 figures

  10. arXiv:2108.02023  [pdf, other

    cs.NE cs.AR cs.ET

    DFSynthesizer: Dataflow-based Synthesis of Spiking Neural Networks to Neuromorphic Hardware

    Authors: Shihao Song, Harry Chong, Adarsha Balaji, Anup Das, James Shackleford, Nagarajan Kandasamy

    Abstract: Spiking Neural Networks (SNN) are an emerging computation model, which uses event-driven activation and bio-inspired learning algorithms. SNN-based machine-learning programs are typically executed on tile- based neuromorphic hardware platforms, where each tile consists of a computation unit called crossbar, which maps neurons and synapses of the program. However, synthesizing such programs on an o… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: Accepted for publication at ACM Transactions on Embedded Computing

  11. WiFi Fingerprint Clustering for Urban Mobility Analysis

    Authors: Sumudu HasalaMarakkalage, Billy Pik Lik Lau, Yuren Zhou, Ran Liu, Chau Yuen, Wei Quin Yow, Keng Hua Chong

    Abstract: In this paper, we present an unsupervised learning approach to identify the user points of interest (POI) by exploiting WiFi measurements from smartphone application data. Due to the lack of GPS positioning accuracy in indoor, sheltered, and high rise building environments, we rely on widely available WiFi access points (AP) in contemporary urban areas to accurately identify POI and mobility patte… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: accepted by IEEE Access

  12. The Study of Urban Residential's Public Space Activeness using Space-centric Approach

    Authors: Billy Pik Lik Lau, Benny Kai Kiat Ng, Chau Yuen, Bige Tuncer, Keng Hua Chong

    Abstract: With the advancement of the Internet of Things (IoT) and communication platform, large scale sensor deployment can be easily implemented in an urban city to collect various information. To date, there are only a handful of research studies about understanding the usage of urban public spaces. Leveraging IoT, various sensors have been deployed in an urban residential area to monitor and study publi… ▽ More

    Submitted 11 January, 2021; v1 submitted 11 January, 2021; originally announced January 2021.

    Comments: Accepted at IEEE Internet of Things Journal 2021

  13. arXiv:2012.12123  [pdf

    cs.NI cs.LG

    Machine Learning Algorithm for NLOS Millimeter Wave in 5G V2X Communication

    Authors: Deepika Mohan, G. G. Md. Nawaz Ali, Peter Han Joo Chong

    Abstract: The 5G vehicle-to-everything (V2X) communication for autonomous and semi-autonomous driving utilizes the wireless technology for communication and the Millimeter Wave bands are widely implemented in this kind of vehicular network application. The main purpose of this paper is to broadcast the messages from the mmWave Base Station to vehicles at LOS (Line-of-sight) and NLOS (Non-LOS). Relay using M… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 14 pages, 9 figures, conference 7th International conference on Computer Networks and Communications (CCNET 2020), AIRCC Publishing Corporation

    Report number: Volume 10, number 17 MSC Class: 68M11 ACM Class: I.6; I.2.2; J.7

  14. Multiple-Perspective Clustering of Passive Wi-Fi Sensing Trajectory Data

    Authors: Zann Koh, Yuren Zhou, Billy Pik Lik Lau, Chau Yuen, Bige Tuncer, Keng Hua Chong

    Abstract: Information about the spatiotemporal flow of humans within an urban context has a wide plethora of applications. Currently, although there are many different approaches to collect such data, there lacks a standardized framework to analyze it. The focus of this paper is on the analysis of the data collected through passive Wi-Fi sensing, as such passively collected data can have a wide coverage at… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: 15 pages, 11 figures

  15. A simulation-based evaluation of a Cargo-Hitching service for E-commerce using mobility-on-demand vehicles

    Authors: Andre Alho, Takanori Sakai, Simon Oh, Cheng Cheng, Ravi Seshadri, Wen Han Chong, Yusuke Hara, Julia Caravias, Lynette Cheah, Moshe Ben-Akiva

    Abstract: Time-sensitive parcel deliveries, shipments requested for delivery in a day or less, are an increasingly important research subject. It is challenging to deal with these deliveries from a carrier perspective since it entails additional planning constraints, preventing an efficient consolidation of deliveries which is possible when demand is well known in advance. Furthermore, such time-sensitive d… ▽ More

    Submitted 22 October, 2020; originally announced October 2020.

    Comments: 19 pages, 4 tables, 7 figures. Submitted to Transportation (Springer)

    Journal ref: Future Transp. 2021, 1, 639-656

  16. arXiv:2007.00054  [pdf, other

    cs.IR cs.SI

    Twitter and Census Data Analytics to Explore Socioeconomic Factors for Post-COVID-19 Reopening Sentiment

    Authors: Md. Mokhlesur Rahman, G. G. Md. Nawaz Ali, Xue Jun Li, Kamal Chandra Paul, Peter H. J. Chong

    Abstract: Investigating and classifying sentiments of social media users towards an item, situation, and system are very popular among the researchers. However, they rarely discuss the underlying socioeconomic factor associations for such sentiments. This study attempts to explore the factors associated with positive and negative sentiments of the people about reopening the economy, in the United States (US… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  17. arXiv:1712.09864  [pdf

    cs.CR

    TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

    Authors: Hengchuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong

    Abstract: Wireless Mesh Networks (WMNs) have emerged as a key technology for the next generation of wireless networking due to its self-forming, self-organizing and self-healing properties. However, due to the multi-hop nature of communications in WMN, we cannot assume that all nodes in the network are cooperative. Nodes may drop all of the data packets they received to mount a Denial of Service (DoS) attac… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: MOBILITY 2014 The Fourth International Conference on Mobile Services, Resources, and Users, Jul 2014, Paris, France

  18. A non-biased trust model for wireless mesh networks

    Authors: Heng Chuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong, Jun Zhang

    Abstract: Trust models that rely on recommendation trusts are vulnerable to badmouthing and ballot-stuffing attacks. To cope with these attacks, existing trust models use different trust aggregation techniques to process the recommendation trusts and combine them with the direct trust values to form a combined trust value. However, these trust models are biased as recommendation trusts that deviate too much… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: International Journal of Communication Systems, Wiley, 2016, 30 (9)

  19. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

    Authors: Hengchuan Tan, Maode Ma, Houda Labiod, Aymen Boudguiga, Jun Zhang, Peter Han Joo Chong

    Abstract: Public key infrastructure (PKI) is the most widely used security mechanism for securing communications over the network. However, there are known performance issues, making it unsuitable for use in vehicular networks. In this paper, we propose a secure and authenticated key management protocol (SA-KMP) to overcome the shortcomings of the PKI. The SA-KMP scheme distributes repository containing the… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers, 2016, 65 (12), pp.9570 - 9584

  20. arXiv:1712.00946  [pdf, other

    cs.IT

    V2X Content Distribution Based on Batched Network Coding with Distributed Scheduling

    Authors: Yumeng Gao, Xiaoli Xu, Yong Liang Guan, Peter Han Joo Chong

    Abstract: Content distribution is an application in intelligent transportation system to assist vehicles in acquiring information such as digital maps and entertainment materials. In this paper, we consider content distribution from a single roadside infrastructure unit to a group of vehicles passing by it. To combat the short connection time and the lossy channel quality, the downloaded contents need to be… ▽ More

    Submitted 3 October, 2018; v1 submitted 4 December, 2017; originally announced December 2017.

    Comments: 12 pages and 9 figures

  21. arXiv:1704.02806  [pdf, other

    cs.IT

    Serving Distance and Coverage in a Closed Access PHP-Based Heterogeneous Cellular Network

    Authors: Zeinab Yazdanshenasan, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: Heterogeneous cellular networks (HCNs) usually exhibit spatial separation amongst base stations (BSs) of different types (termed tiers in this paper). For instance, operators will usually not deploy a picocell in close proximity to a macrocell, thus inducing separation amongst the locations of pico and macrocells. This separation has recently been captured by modeling the small cell locations by a… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: Proc., Biennial Symposium on Communications (BSC), 2016

  22. Poisson Hole Process: Theory and Applications to Wireless Networks

    Authors: Zeinab Yazdanshenasan, Harpreet S. Dhillon, Mehrnaz Afshang, Peter Han Joo Chong

    Abstract: Interference field in wireless networks is often modeled by a homogeneous Poisson Point Process (PPP). While it is realistic in modeling the inherent node irregularity and provides meaningful first-order results, it falls short in modeling the effect of interference management techniques, which typically introduce some form of spatial interaction among active transmitters. In some applications, su… ▽ More

    Submitted 7 January, 2016; v1 submitted 6 January, 2016; originally announced January 2016.

    Comments: 15 pages. Submitted to IEEE Transactions on Wireless Communications

  23. Fundamentals of Cluster-Centric Content Placement in Cache-Enabled Device-to-Device Networks

    Authors: Mehrnaz Afshang, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: This paper develops a comprehensive analytical framework with foundations in stochastic geometry to characterize the performance of cluster-centric content placement in a cache-enabled device-to-device (D2D) network. Different from device-centric content placement, cluster-centric placement focuses on placing content in each cluster such that the collective performance of all the devices in each c… ▽ More

    Submitted 9 February, 2016; v1 submitted 15 September, 2015; originally announced September 2015.

    Comments: 16 pages, 10 figures. Submitted to IEEE Transactions on Communications

  24. arXiv:1509.00070  [pdf

    cs.ET cond-mat.mtrl-sci physics.data-an

    In-Line-Test of Variability and Bit-Error-Rate of HfOx-Based Resistive Memory

    Authors: B. L. Ji, H. Li, Q. Ye, S. Gausepohl, S. Deora, D. Veksler, S. Vivekanand, H. Chong, H. Stamper, T. Burroughs, C. Johnson, M. Smalley, S. Bennett, V. Kaushik, J. Piccirillo, M. Rodgers, M. Passaro, M. Liehr

    Abstract: Spatial and temporal variability of HfOx-based resistive random access memory (RRAM) are investigated for manufacturing and product designs. Manufacturing variability is characterized at different levels including lots, wafers, and chips. Bit-error-rate (BER) is proposed as a holistic parameter for the write cycle resistance statistics. Using the electrical in-line-test cycle data, a method is dev… ▽ More

    Submitted 31 August, 2015; originally announced September 2015.

    Comments: 4 pages. Memory Workshop (IMW), 2015 IEEE International

    Journal ref: 2015 IEEE International Memory Workshop(IMW), 17-20 May 2015 URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7150290&isnumber=7150256

  25. Modeling and Performance Analysis of Clustered Device-to-Device Networks

    Authors: Mehrnaz Afshang, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: Device-to-device (D2D) communication enables direct communication between proximate devices thereby improving the overall spectrum utilization and offloading traffic from cellular networks. This paper develops a new spatial model for D2D networks in which the device locations are modeled as a Poisson cluster process. Using this model, we study the performance of a typical D2D receiver in terms of… ▽ More

    Submitted 11 August, 2015; v1 submitted 11 August, 2015; originally announced August 2015.

    Comments: 34 double-spaced pages, 10 figures. Submitted to IEEE Transactions on Wireless Communications

  26. arXiv:1504.04464  [pdf, other

    cs.IT cs.NI

    Two-Phase Cooperative Broadcasting Based on Batched Network Code

    Authors: Xiaoli Xu, Praveen Kumar M. Gandhi, Yong Liang Guan, Peter Han Joo Chong

    Abstract: In this paper, we consider the wireless broadcasting scenario with a source node sending some common information to a group of closely located users, where each link is subject to certain packet erasures. To ensure reliable information reception by all users, the conventional approach generally requires repeated transmission by the source until all the users are able to decode the information, whi… ▽ More

    Submitted 17 April, 2015; originally announced April 2015.

  27. Mobile Data Offloading through A Third-Party WiFi Access Point: An Operator's Perspective

    Authors: Xin Kang, Yeow-Khiang Chia, Sumei Sun, Hon Fah Chong

    Abstract: WiFi offloading is regarded as one of the most promising techniques to deal with the explosive data increase in cellular networks due to its high data transmission rate and low requirement on devices. In this paper, we investigate the mobile data offloading problem through a third-party WiFi access point (AP) for a cellular mobile system. From the cellular operator's perspective, by assuming a usa… ▽ More

    Submitted 22 August, 2014; originally announced August 2014.

    Comments: To appear in IEEE Trans. Wireless Communications

  28. arXiv:1403.0355  [pdf, ps, other

    cs.IT

    Ergodic Sum-Rate Maximization for Fading Cognitive Multiple Access Channels without Successive Interference Cancellation

    Authors: Xin Kang, Hon Fah Chong, Yeow-Khiang Chia, Sumei Sun

    Abstract: In this paper, the ergodic sum-rate of a fading cognitive multiple access channel (C-MAC) is studied, where a secondary network (SN) with multiple secondary users (SUs) transmitting to a secondary base station (SBS) shares the spectrum band with a primary user (PU). An interference power constraint (IPC) is imposed on the SN to protect the PU. Under such a constraint and the individual transmit po… ▽ More

    Submitted 3 March, 2014; originally announced March 2014.

    Comments: Under Review