Zum Hauptinhalt springen

Showing 1–24 of 24 results for author: Horvath, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10817  [pdf, other

    cs.DB

    A framework for optimisation based stochastic process discovery

    Authors: Pierre Cry, András Horváth, Paolo Ballarini, Pascal Le Gall

    Abstract: Process mining is concerned with deriving formal models capable of reproducing the behaviour of a given organisational process by analysing observed executions collected in an event log. The elements of an event log are finite sequences (i.e., traces or words) of actions. Many effective algorithms have been introduced which issue a control flow model (commonly in Petri net form) aimed at reproduci… ▽ More

    Submitted 2 July, 2024; v1 submitted 16 June, 2024; originally announced June 2024.

  2. arXiv:2312.14210  [pdf, other

    cs.LG nlin.AO

    Forecasting Fold Bifurcations through Physics-Informed Convolutional Neural Networks

    Authors: Giuseppe Habib, Ádám Horváth

    Abstract: This study proposes a physics-informed convolutional neural network (CNN) for identifying dynamical systems' time series near a fold bifurcation. The peculiarity of this work is that the CNN is trained with a relatively small amount of data and on a single, very simple system. In contrast, the CNN is validated on much more complicated systems. A similar task requires significant extrapolation capa… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

  3. arXiv:2310.03578  [pdf, other

    cs.LG

    Targeted Adversarial Attacks on Generalizable Neural Radiance Fields

    Authors: Andras Horvath, Csaba M. Jozsa

    Abstract: Neural Radiance Fields (NeRFs) have recently emerged as a powerful tool for 3D scene representation and rendering. These data-driven models can learn to synthesize high-quality images from sparse 2D observations, enabling realistic and interactive scene reconstructions. However, the growing usage of NeRFs in critical applications such as augmented reality, robotics, and virtual environments could… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  4. arXiv:2308.03887  [pdf, other

    eess.IV cs.LG q-bio.QM

    Enhancing Cell Tracking with a Time-Symmetric Deep Learning Approach

    Authors: Gergely Szabó, Paolo Bonaiuti, Andrea Ciliberto, András Horváth

    Abstract: The accurate tracking of live cells using video microscopy recordings remains a challenging task for popular state-of-the-art image processing based object tracking methods. In recent years, several existing and new applications have attempted to integrate deep-learning based frameworks for this task, but most of them still heavily rely on consecutive frame based tracking embedded in their archite… ▽ More

    Submitted 18 September, 2023; v1 submitted 4 August, 2023; originally announced August 2023.

  5. arXiv:2302.04208  [pdf, other

    cs.LG stat.ML

    Exploratory Analysis of Federated Learning Methods with Differential Privacy on MIMIC-III

    Authors: Aron N. Horvath, Matteo Berchier, Farhad Nooralahzadeh, Ahmed Allam, Michael Krauthammer

    Abstract: Background: Federated learning methods offer the possibility of training machine learning models on privacy-sensitive data sets, which cannot be easily shared. Multiple regulations pose strict requirements on the storage and usage of healthcare data, leading to data being in silos (i.e. locked-in at healthcare facilities). The application of federated algorithms on these datasets could accelerate… ▽ More

    Submitted 8 February, 2023; originally announced February 2023.

  6. arXiv:2205.14686  [pdf, other

    cs.CV cs.AI

    Saliency Map Based Data Augmentation

    Authors: Jalal Al-afandi, Bálint Magyar, András Horváth

    Abstract: Data augmentation is a commonly applied technique with two seemingly related advantages. With this method one can increase the size of the training set generating new samples and also increase the invariance of the network against the applied transformations. Unfortunately all images contain both relevant and irrelevant features for classification therefore this invariance has to be class specific… ▽ More

    Submitted 29 May, 2022; originally announced May 2022.

  7. arXiv:2205.10539  [pdf, other

    cs.CV cs.AI

    On the Feasibility and Generality of Patch-based Adversarial Attacks on Semantic Segmentation Problems

    Authors: Soma Kontar, Andras Horvath

    Abstract: Deep neural networks were applied with success in a myriad of applications, but in safety critical use cases adversarial attacks still pose a significant threat. These attacks were demonstrated on various classification and detection tasks and are usually considered general in a sense that arbitrary network outputs can be generated by them. In this paper we will demonstrate through simple case s… ▽ More

    Submitted 21 May, 2022; originally announced May 2022.

  8. arXiv:2112.09195  [pdf, other

    cs.CV cs.LG

    Mitigating the Bias of Centered Objects in Common Datasets

    Authors: Gergely Szabo, Andras Horvath

    Abstract: Convolutional networks are considered shift invariant, but it was demonstrated that their response may vary according to the exact location of the objects. In this paper we will demonstrate that most commonly investigated datasets have a bias, where objects are over-represented at the center of the image during training. This bias and the boundary condition of these networks can have a significant… ▽ More

    Submitted 4 August, 2023; v1 submitted 16 December, 2021; originally announced December 2021.

  9. Understanding How Programmers Can Use Annotations on Documentation

    Authors: Amber Horvath, Michael Xieyang Liu, River Hendriksen, Connor Shannon, Emma Paterson, Kazi Jawad, Andrew Macvean, Brad A. Myers

    Abstract: Modern software development requires developers to find and effectively utilize new APIs and their documentation, but documentation has many well-known issues. Despite this, developers eventually overcome these issues but have no way of sharing what they learned. We investigate sharing this documentation-specific information through \textit{annotations}, which have advantages over developer forums… ▽ More

    Submitted 11 January, 2022; v1 submitted 16 November, 2021; originally announced November 2021.

    Comments: Conditionally accepted for publication at CHI '22

    ACM Class: H.5.5

  10. arXiv:2011.00869  [pdf, other

    cs.CV cs.AI

    Receptive Field Size Optimization with Continuous Time Pooling

    Authors: Dóra Babicz, Soma Kontár, Márk Pető, András Fülöp, Gergely Szabó, András Horváth

    Abstract: The pooling operation is a cornerstone element of convolutional neural networks. These elements generate receptive fields for neurons, in which local perturbations should have minimal effect on the output activations, increasing robustness and invariance of the network. In this paper we will present an altered version of the most commonly applied method, maximum pooling, where pooling in theory is… ▽ More

    Submitted 6 November, 2020; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Paper accepted for WACV : Workshop on Applications of Computer Vision 2021

  11. arXiv:2010.08251  [pdf, other

    cs.LG cs.AI cs.NE

    Filtered Batch Normalization

    Authors: Andras Horvath, Jalal Al-afandi

    Abstract: It is a common assumption that the activation of different layers in neural networks follow Gaussian distribution. This distribution can be transformed using normalization techniques, such as batch-normalization, increasing convergence speed and improving accuracy. In this paper we would like to demonstrate, that activations do not necessarily follow Gaussian distribution in all layers. Neurons in… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

    Comments: Submitted to ICPR

  12. arXiv:2010.07045  [pdf, other

    eess.IV cs.CV cs.LG

    3D Segmentation Networks for Excessive Numbers of Classes: Distinct Bone Segmentation in Upper Bodies

    Authors: Eva Schnider, Antal Horváth, Georg Rauter, Azhar Zam, Magdalena Müller-Gerbl, Philippe C. Cattin

    Abstract: Segmentation of distinct bones plays a crucial role in diagnosis, planning, navigation, and the assessment of bone metastasis. It supplies semantic knowledge to visualisation tools for the planning of surgical interventions and the education of health professionals. Fully supervised segmentation of 3D data using Deep Learning methods has been extensively studied for many tasks but is usually restr… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: 10 pages, 3 figures, 2 tables, accepted into MICCAI 2020 International Workshop on Machine Learning in Medical Imaging

    Journal ref: Machine Learning in Medical Imaging. MLMI 2020. Lecture Notes in Computer Science, vol 12436. Springer, Cham

  13. arXiv:2007.10495  [pdf, other

    cs.CV cs.LG

    Sorted Pooling in Convolutional Networks for One-shot Learning

    Authors: András Horváth

    Abstract: We present generalized versions of the commonly used maximum pooling operation: $k$th maximum and sorted pooling operations which selects the $k$th largest response in each pooling region, selecting locally consistent features of the input images. This method is able to increase the generalization power of a network and can be used to decrease training time and error rate of networks and it can si… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: Old paper submitted to ECCV 2018

  14. arXiv:1907.01650  [pdf, other

    cs.LG cs.CR stat.ML

    MimosaNet: An Unrobust Neural Network Preventing Model Stealing

    Authors: Kálmán Szentannai, Jalal Al-Afandi, András Horváth

    Abstract: Deep Neural Networks are robust to minor perturbations of the learned network parameters and their minor modifications do not change the overall network response significantly. This allows space for model stealing, where a malevolent attacker can steal an already trained network, modify the weights and claim the new network his own intellectual property. In certain cases this can prevent the free… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: Presented at CVPR workshop: Adversarial Machine Learning in Real-World Computer Vision Systems

  15. arXiv:1903.06649  [pdf, other

    cs.ET cs.CV cs.DC

    Application-level Studies of Cellular Neural Network-based Hardware Accelerators

    Authors: Qiuwen Lou, Indranil Palit, Tang Li, Andras Horvath, Michael Niemier, X. Sharon Hu

    Abstract: As cost and performance benefits associated with Moore's Law scaling slow, researchers are studying alternative architectures (e.g., based on analog and/or spiking circuits) and/or computational models (e.g., convolutional and recurrent neural networks) to perform application-level tasks faster, more energy efficiently, and/or more accurately. We investigate cellular neural network (CeNN)-based co… ▽ More

    Submitted 12 June, 2019; v1 submitted 28 February, 2019; originally announced March 2019.

  16. arXiv:1902.08134  [pdf, other

    cs.LG cs.CV stat.ML

    Domain Partitioning Network

    Authors: Botos Csaba, Adnane Boukhayma, Viveka Kulharia, András Horváth, Philip H. S. Torr

    Abstract: Standard adversarial training involves two agents, namely a generator and a discriminator, playing a mini-max game. However, even if the players converge to an equilibrium, the generator may only recover a part of the target data distribution, in a situation commonly referred to as mode collapse. In this work, we present the Domain Partitioning Network (DoPaNet), a new approach to deal with mode c… ▽ More

    Submitted 21 February, 2019; originally announced February 2019.

    Comments: 18 pages, 13 figures

  17. arXiv:1811.02636  [pdf, other

    cs.CV

    A mixed signal architecture for convolutional neural networks

    Authors: Qiuwen Lou, Chenyun Pan, John McGuiness, Andras Horvath, Azad Naeemi, Michael Niemier, X. Sharon Hu

    Abstract: Deep neural network (DNN) accelerators with improved energy and delay are desirable for meeting the requirements of hardware targeted for IoT and edge computing systems. Convolutional neural networks (CoNNs) belong to one of the most popular types of DNN architectures. This paper presents the design and evaluation of an accelerator for CoNNs. The system-level architecture is based on mixed-signal,… ▽ More

    Submitted 2 May, 2019; v1 submitted 30 October, 2018; originally announced November 2018.

    Comments: 25 pages

  18. arXiv:1808.02408  [pdf, other

    cs.CV

    Spinal Cord Gray Matter-White Matter Segmentation on Magnetic Resonance AMIRA Images with MD-GRU

    Authors: Antal Horvath, Charidimos Tsagkas, Simon Andermatt, Simon Pezold, Katrin Parmar, Philippe Cattin

    Abstract: The small butterfly shaped structure of spinal cord (SC) gray matter (GM) is challenging to image and to delinate from its surrounding white matter (WM). Segmenting GM is up to a point a trade-off between accuracy and precision. We propose a new pipeline for GM-WM magnetic resonance (MR) image acquisition and segmentation. We report superior results as compared to the ones recently reported in the… ▽ More

    Submitted 7 August, 2018; originally announced August 2018.

    Comments: MICCAI 2018 CSI workshop, 12 pages, 7 figures, 3 tables

  19. Pathology Segmentation using Distributional Differences to Images of Healthy Origin

    Authors: Simon Andermatt, Antal Horváth, Simon Pezold, Philippe Cattin

    Abstract: Fully supervised segmentation methods require a large training cohort of already segmented images, providing information at the pixel level of each image. We present a method to automatically segment and model pathologies in medical images, trained solely on data labelled on the image level as either healthy or containing a visual defect. We base our method on CycleGAN, an image-to-image translati… ▽ More

    Submitted 21 August, 2019; v1 submitted 25 May, 2018; originally announced May 2018.

    Journal ref: In International MICCAI Brainlesion Workshop, pp. 228-238. Springer, Cham, 2018

  20. arXiv:1707.08401  [pdf, other

    cs.CV

    Detecting and classifying lesions in mammograms with Deep Learning

    Authors: Dezső Ribli, Anna Horváth, Zsuzsa Unger, Péter Pollner, István Csabai

    Abstract: In the last two decades Computer Aided Diagnostics (CAD) systems were developed to help radiologists analyze screening mammograms. The benefits of current CAD technologies appear to be contradictory and they should be improved to be ultimately considered useful. Since 2012 deep convolutional neural networks (CNN) have been a tremendous success in image recognition, reaching human performance. Thes… ▽ More

    Submitted 9 November, 2017; v1 submitted 26 July, 2017; originally announced July 2017.

  21. arXiv:1406.1352  [pdf, other

    cs.PF math.PR q-bio.QM

    Approximate analysis of biological systems by hybrid switching jump diffusion

    Authors: Alessio Angius, Gianfranco Balbo, Marco Beccuti, Enrico Bibbona, Andras Horvath, Roberta Sirovich

    Abstract: In this paper we consider large state space continuous time Markov chains (MCs) arising in the field of systems biology. For density dependent families of MCs that represent the interaction of large groups of identical objects, Kurtz has proposed two kinds of approximations. One is based on ordinary differential equations, while the other uses a diffusion process. The computational cost of the det… ▽ More

    Submitted 3 March, 2015; v1 submitted 5 June, 2014; originally announced June 2014.

  22. arXiv:1404.0975  [pdf, other

    cs.PF math.PR

    Analysis of Petri Net Models through Stochastic Differential Equations

    Authors: Marco Beccuti, Enrico Bibbona, Andras Horvath, Roberta Sirovich, Alessio Angius, Gianfranco Balbo

    Abstract: It is well known, mainly because of the work of Kurtz, that density dependent Markov chains can be approximated by sets of ordinary differential equations (ODEs) when their indexing parameter grows very large. This approximation cannot capture the stochastic nature of the process and, consequently, it can provide an erroneous view of the behavior of the Markov chain if the indexing parameter is no… ▽ More

    Submitted 3 April, 2014; originally announced April 2014.

  23. PN2SC Case Study: An EMF-IncQuery solution

    Authors: Benedek Izsó, Ábel Hegedüs, Gábor Bergmann, Ákos Horváth, István Ráth

    Abstract: The paper presents a solution for the Petri-Net to Statecharts case study of the Transformation Tool Contest 2013, using EMF-IncQuery and Xtend for implementing the model transformation.

    Submitted 2 December, 2013; originally announced December 2013.

    Comments: In Proceedings TTC 2013, arXiv:1311.7536

    Journal ref: EPTCS 135, 2013, pp. 106-114

  24. arXiv:cs/0305061  [pdf, ps, other

    cs.DC

    A Secure Infrastructure For System Console and Reset Access

    Authors: Andras Horvath, Emanuele Leonardi, Markus Schulz

    Abstract: During the last years large farms have been built using commodity hardware. This hardware lacks components for remote and automated administration. Products that can be retrofitted to these systems are either costly or inherently insecure. We present a system based on serial ports and simple machine controlled relays. We report on experience gained by setting up a 50-machine test environment as… ▽ More

    Submitted 30 May, 2003; originally announced May 2003.

    Comments: Conference for Computing in High Energy and Nuclear Physics (CHEP2003), March 24-28, 2003, La Jolla, California

    ACM Class: K.6.4; C.2.4