Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: Huang, H H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08488  [pdf, other

    cs.CV cs.AI cs.LG

    ICE-G: Image Conditional Editing of 3D Gaussian Splats

    Authors: Vishnu Jaganathan, Hannah Hanyun Huang, Muhammad Zubair Irshad, Varun Jampani, Amit Raj, Zsolt Kira

    Abstract: Recently many techniques have emerged to create high quality 3D assets and scenes. When it comes to editing of these objects, however, existing approaches are either slow, compromise on quality, or do not provide enough customization. We introduce a novel approach to quickly edit a 3D model from a single reference view. Our technique first segments the edit image, and then matches semantically cor… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

    Comments: Accepted to CVPR AI4CC Workshop 2024. Project page: https://ice-gaussian.github.io

  2. arXiv:2403.18667  [pdf, other

    cs.IR cs.CL

    Improving Content Recommendation: Knowledge Graph-Based Semantic Contrastive Learning for Diversity and Cold-Start Users

    Authors: Yejin Kim, Scott Rome, Kevin Foley, Mayur Nankani, Rimon Melamed, Javier Morales, Abhay Yadav, Maria Peifer, Sardar Hamidian, H. Howie Huang

    Abstract: Addressing the challenges related to data sparsity, cold-start problems, and diversity in recommendation systems is both crucial and demanding. Many current solutions leverage knowledge graphs to tackle these issues by combining both item-based and user-item collaborative signals. A common trend in these approaches focuses on improving ranking performance at the cost of escalating model complexity… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

    Comments: Accepted at LREC-COLING 2024

  3. arXiv:2312.05639  [pdf, other

    cs.DC cs.PF cs.PL

    JITSPMM: Just-in-Time Instruction Generation for Accelerated Sparse Matrix-Matrix Multiplication

    Authors: Qiang Fu, Thomas B. Rolinger, H. Howie Huang

    Abstract: Achieving high performance for Sparse MatrixMatrix Multiplication (SpMM) has received increasing research attention, especially on multi-core CPUs, due to the large input data size in applications such as graph neural networks (GNNs). Most existing solutions for SpMM computation follow the aheadof-time (AOT) compilation approach, which compiles a program entirely before it is executed. AOT compila… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

  4. arXiv:2311.07064  [pdf, other

    cs.CL

    Prompt have evil twins

    Authors: Rimon Melamed, Lucas H. McCabe, Tanay Wakhare, Yejin Kim, H. Howie Huang, Enric Boix-Adsera

    Abstract: We discover that many natural-language prompts can be replaced by corresponding prompts that are unintelligible to humans but that provably elicit similar behavior in language models. We call these prompts "evil twins" because they are obfuscated and uninterpretable (evil), but at the same time mimic the functionality of the original natural-language prompts (twins). Remarkably, evil twins transfe… ▽ More

    Submitted 29 April, 2024; v1 submitted 12 November, 2023; originally announced November 2023.

    Comments: Preprint. Under review

  5. arXiv:2310.00843  [pdf, other

    cs.CR cs.IT

    Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection

    Authors: Bibek Bhattarai, H. Howie Huang

    Abstract: Modern cyber attackers use advanced zero-day exploits, highly targeted spear phishing, and other social engineering techniques to gain access and also use evasion techniques to maintain a prolonged presence within the victim network while working gradually towards the objective. To minimize the damage, it is necessary to detect these Advanced Persistent Threats as early in the campaign as possible… ▽ More

    Submitted 1 October, 2023; originally announced October 2023.

  6. arXiv:2303.14836  [pdf, other

    cs.LG cs.CR

    Illuminati: Towards Explaining Graph Neural Networks for Cybersecurity Analysis

    Authors: Haoyu He, Yuede Ji, H. Howie Huang

    Abstract: Graph neural networks (GNNs) have been utilized to create multi-layer graph models for a number of cybersecurity applications from fraud detection to software vulnerability analysis. Unfortunately, like traditional neural networks, GNNs also suffer from a lack of transparency, that is, it is challenging to interpret the model predictions. Prior works focused on specific factor explanations for a G… ▽ More

    Submitted 26 March, 2023; originally announced March 2023.

    Comments: EuroS&P 2022

  7. Is Embodied Interaction Beneficial? A Study on Navigating Network Visualizations

    Authors: Helen H. Huang, Hanspeter Pfister, Yalong Yang

    Abstract: Network visualizations are commonly used to analyze relationships in various contexts. To efficiently explore a network visualization, the user needs to quickly navigate to different parts of the network and analyze local details. Recent advancements in display and interaction technologies inspire new visions for improved visualization and interaction design. Past research into network design has… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    Comments: Accepted by the Information Visualization journal

  8. arXiv:2209.05972  [pdf, other

    cs.CL cs.AI

    Don't Judge a Language Model by Its Last Layer: Contrastive Learning with Layer-Wise Attention Pooling

    Authors: Dongsuk Oh, Yejin Kim, Hodong Lee, H. Howie Huang, Heuiseok Lim

    Abstract: Recent pre-trained language models (PLMs) achieved great success on many natural language processing tasks through learning linguistic features and contextualized sentence representation. Since attributes captured in stacked layers of PLMs are not clearly identified, straightforward approaches such as embedding the last layer are commonly preferred to derive sentence representations from PLMs. Thi… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Comments: Accepted to COLING 2022

  9. arXiv:2012.10531  [pdf, other

    cs.LG cs.AI

    A Graph Attention Based Approach for Trajectory Prediction in Multi-agent Sports Games

    Authors: Ding Ding, H. Howie Huang

    Abstract: This work investigates the problem of multi-agents trajectory prediction. Prior approaches lack of capability of capturing fine-grained dependencies among coordinated agents. In this paper, we propose a spatial-temporal trajectory prediction approach that is able to learn the strategy of a team with multiple coordinated agents. In particular, we use graph-based attention model to learn the depende… ▽ More

    Submitted 18 December, 2020; originally announced December 2020.

  10. arXiv:2008.09192  [pdf

    cs.CR cs.LG

    PicoDomain: A Compact High-Fidelity Cybersecurity Dataset

    Authors: Craig Laprade, Benjamin Bowman, H. Howie Huang

    Abstract: Analysis of cyber relevant data has become an area of increasing focus. As larger percentages of businesses and governments begin to understand the implications of cyberattacks, the impetus for better cybersecurity solutions has increased. Unfortunately, current cybersecurity datasets either offer no ground truth or do so with anonymized data. The former leads to a quandary when verifying results… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

  11. arXiv:1812.04070  [pdf, other

    cs.DC

    SIMD-X: Programming and Processing of Graph Algorithms on GPUs

    Authors: Hang Liu, H. Howie Huang

    Abstract: With high computation power and memory bandwidth, graphics processing units (GPUs) lend themselves to accelerate data-intensive analytics, especially when such applications fit the single instruction multiple data (SIMD) model. However, graph algorithms such as breadth-first search and k-core, often fail to take full advantage of GPUs, due to irregularity in memory access and control flow. To addr… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.