Zum Hauptinhalt springen

Showing 1–14 of 14 results for author: Kooi, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.15383  [pdf, other

    cs.CV

    Is user feedback always informative? Retrieval Latent Defending for Semi-Supervised Domain Adaptation without Source Data

    Authors: Junha Song, Tae Soo Kim, Junha Kim, Gunhee Nam, Thijs Kooi, Jaegul Choo

    Abstract: This paper aims to adapt the source model to the target environment, leveraging small user feedback (i.e., labeled target data) readily available in real-world applications. We find that existing semi-supervised domain adaptation (SemiSDA) methods often suffer from poorly improved adaptation performance when directly utilizing such feedback data, as shown in Figure 1. We analyze this phenomenon vi… ▽ More

    Submitted 22 July, 2024; originally announced July 2024.

    Comments: Accepted to ECCV 2024, Project page: https://sites.google.com/view/junha/nbf-rld

  2. arXiv:2304.05303  [pdf, other

    cs.CV cs.CL

    ELVIS: Empowering Locality of Vision Language Pre-training with Intra-modal Similarity

    Authors: Sumin Seo, JaeWoong Shin, Jaewoo Kang, Tae Soo Kim, Thijs Kooi

    Abstract: Deep learning has shown great potential in assisting radiologists in reading chest X-ray (CXR) images, but its need for expensive annotations for improving performance prevents widespread clinical application. Visual language pre-training (VLP) can alleviate the burden and cost of annotation by leveraging routinely generated reports for radiographs, which exist in large quantities as well as in pa… ▽ More

    Submitted 23 July, 2023; v1 submitted 11 April, 2023; originally announced April 2023.

    Comments: Under review

  3. arXiv:2303.15699  [pdf, other

    cs.CV

    Enhancing Breast Cancer Risk Prediction by Incorporating Prior Images

    Authors: Hyeonsoo Lee, Junha Kim, Eunkyung Park, Minjeong Kim, Taesoo Kim, Thijs Kooi

    Abstract: Recently, deep learning models have shown the potential to predict breast cancer risk and enable targeted screening strategies, but current models do not consider the change in the breast over time. In this paper, we present a new method, PRIME+, for breast cancer risk prediction that leverages prior mammograms using a transformer decoder, outperforming a state-of-the-art risk prediction method th… ▽ More

    Submitted 28 August, 2023; v1 submitted 27 March, 2023; originally announced March 2023.

    Comments: MICCAI 2023 accepted

  4. Understanding metric-related pitfalls in image analysis validation

    Authors: Annika Reinke, Minu D. Tizabi, Michael Baumgartner, Matthias Eisenmann, Doreen Heckmann-Nötzel, A. Emre Kavur, Tim Rädsch, Carole H. Sudre, Laura Acion, Michela Antonelli, Tal Arbel, Spyridon Bakas, Arriel Benis, Matthew Blaschko, Florian Buettner, M. Jorge Cardoso, Veronika Cheplygina, Jianxu Chen, Evangelia Christodoulou, Beth A. Cimini, Gary S. Collins, Keyvan Farahani, Luciana Ferrer, Adrian Galdran, Bram van Ginneken , et al. (53 additional authors not shown)

    Abstract: Validation metrics are key for the reliable tracking of scientific progress and for bridging the current chasm between artificial intelligence (AI) research and its translation into practice. However, increasing evidence shows that particularly in image analysis, metrics are often chosen inadequately in relation to the underlying research problem. This could be attributed to a lack of accessibilit… ▽ More

    Submitted 23 February, 2024; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: Shared first authors: Annika Reinke and Minu D. Tizabi; shared senior authors: Lena Maier-Hein and Paul F. Jäger. Published in Nature Methods. arXiv admin note: text overlap with arXiv:2206.01653

    Journal ref: Nature methods, 1-13 (2024)

  5. OOOE: Only-One-Object-Exists Assumption to Find Very Small Objects in Chest Radiographs

    Authors: Gunhee Nam, Taesoo Kim, Sanghyup Lee, Thijs Kooi

    Abstract: The accurate localization of inserted medical tubes and parts of human anatomy is a common problem when analyzing chest radiographs and something deep neural networks could potentially automate. However, many foreign objects like tubes and various anatomical structures are small in comparison to the entire chest X-ray, which leads to severely unbalanced data and makes training deep neural networks… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: AMAI Workshop, MICCAI 2022

  6. arXiv:2209.15314  [pdf, other

    cs.CV

    Did You Get What You Paid For? Rethinking Annotation Cost of Deep Learning Based Computer Aided Detection in Chest Radiographs

    Authors: Tae Soo Kim, Geonwoon Jang, Sanghyup Lee, Thijs Kooi

    Abstract: As deep networks require large amounts of accurately labeled training data, a strategy to collect sufficiently large and accurate annotations is as important as innovations in recognition methods. This is especially true for building Computer Aided Detection (CAD) systems for chest X-rays where domain expertise of radiologists is required to annotate the presence and location of abnormalities on X… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: MICCAI 2022, Contains Supplemental Material

  7. arXiv:2208.00766  [pdf, other

    eess.IV cs.CV

    Tutorial on the development of AI models for medical image analysis

    Authors: Thijs Kooi

    Abstract: The idea of using computers to read medical scans was introduced as early as 1966. However, limits to machine learning technology meant progress was slow initially. The Alexnet breakthrough in 2012 sparked new interest in the topic, which resulted in the release of 100s of medical AI solutions on the market. In spite of success for some diseases and modalities, many challenges remain. Research typ… ▽ More

    Submitted 14 July, 2022; originally announced August 2022.

    Comments: Tutorial notes for a MICCAI tutorial on AI for medical image analysis in practice

  8. arXiv:2104.05642  [pdf, other

    eess.IV cs.CV

    Common Limitations of Image Processing Metrics: A Picture Story

    Authors: Annika Reinke, Minu D. Tizabi, Carole H. Sudre, Matthias Eisenmann, Tim Rädsch, Michael Baumgartner, Laura Acion, Michela Antonelli, Tal Arbel, Spyridon Bakas, Peter Bankhead, Arriel Benis, Matthew Blaschko, Florian Buettner, M. Jorge Cardoso, Jianxu Chen, Veronika Cheplygina, Evangelia Christodoulou, Beth Cimini, Gary S. Collins, Sandy Engelhardt, Keyvan Farahani, Luciana Ferrer, Adrian Galdran, Bram van Ginneken , et al. (68 additional authors not shown)

    Abstract: While the importance of automatic image analysis is continuously increasing, recent meta-research revealed major flaws with respect to algorithm validation. Performance metrics are particularly key for meaningful, objective, and transparent performance assessment and validation of the used automatic algorithms, but relatively little attention has been given to the practical pitfalls when using spe… ▽ More

    Submitted 6 December, 2023; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: Shared first authors: Annika Reinke and Minu D. Tizabi. This is a dynamic paper on limitations of commonly used metrics. It discusses metrics for image-level classification, semantic and instance segmentation, and object detection. For missing use cases, comments or questions, please contact [email protected]. Substantial contributions to this document will be acknowledged with a co-authorship

  9. arXiv:1907.05139  [pdf, other

    cs.IT

    Error Exponents for Asynchronous Multiple Access Channels. Controlled Asynchronism may Outperform Synchronism

    Authors: Lóránt Farkas, Tamás Kói

    Abstract: Exponential error bounds achievable by universal coding and decoding are derived for frame-asynchronous discrete memoryless %asynchronous multiple access channels with two senders, via the method of subtypes, a refinement of the method of types. Maximum empirical multi-information decoding is employed. A key tool is an improved packing lemma, that overcomes the technical difficulty caused by codew… ▽ More

    Submitted 3 February, 2020; v1 submitted 11 July, 2019; originally announced July 2019.

    Comments: 35 pages, 9 figures, will submitted to Transaction on Information Theory

  10. arXiv:1703.07715  [pdf, other

    cs.CV

    Classifying Symmetrical Differences and Temporal Change in Mammography Using Deep Neural Networks

    Authors: Thijs Kooi, Nico Karssemeijer

    Abstract: We investigate the addition of symmetry and temporal context information to a deep Convolutional Neural Network (CNN) with the purpose of detecting malignant soft tissue lesions in mammography. We employ a simple linear mapping that takes the location of a mass candidate and maps it to either the contra-lateral or prior mammogram and Regions Of Interest (ROI) are extracted around each location. We… ▽ More

    Submitted 1 August, 2017; v1 submitted 22 March, 2017; originally announced March 2017.

  11. A Survey on Deep Learning in Medical Image Analysis

    Authors: Geert Litjens, Thijs Kooi, Babak Ehteshami Bejnordi, Arnaud Arindra Adiyoso Setio, Francesco Ciompi, Mohsen Ghafoorian, Jeroen A. W. M. van der Laak, Bram van Ginneken, Clara I. Sánchez

    Abstract: Deep learning algorithms, in particular convolutional networks, have rapidly become a methodology of choice for analyzing medical images. This paper reviews the major deep learning concepts pertinent to medical image analysis and summarizes over 300 contributions to the field, most of which appeared in the last year. We survey the use of deep learning for image classification, object detection, se… ▽ More

    Submitted 4 June, 2017; v1 submitted 19 February, 2017; originally announced February 2017.

    Comments: Revised survey includes expanded discussion section and reworked introductory section on common deep architectures. Added missed papers from before Feb 1st 2017

    Journal ref: Med Image Anal. (2017) 42:60-88

  12. arXiv:1607.01935  [pdf, other

    cs.IT

    Universal Random Access Error Exponents for Codebooks of Different Word-Lengths

    Authors: Lóránt Farkas, Tamás Kói

    Abstract: Csiszár's channel coding theorem for multiple codebooks is generalized allowing the codeword lenghts differ across codebooks. Also in this case, for each codebook an error exponent can be achieved that equals the random coding exponent for this codebook alone, in addition, erasure detection failure probability tends to 0. This is proved even for sender and receiver not knowing the channel. As a co… ▽ More

    Submitted 22 January, 2017; v1 submitted 7 July, 2016; originally announced July 2016.

    Comments: This paper is submitted to IEEE Transactions on Information Theory. It was presented in part at the recent result poster session of ISIT 2016, Barcelona

  13. arXiv:1301.6412  [pdf, ps, other

    cs.IT

    Random Access and Source-Channel Coding Error Exponents for Multiple Access Channels

    Authors: Lóránt Farkas, Tamás Kói

    Abstract: A new universal coding/decoding scheme for random access with collision detection is given in the case of two senders. The result is used to give an achievable joint source-channel coding error exponent for multiple access channels in the case of independent sources. This exponent is improved in a modified model that admits error free 0 rate communication between the senders.

    Submitted 18 September, 2013; v1 submitted 27 January, 2013; originally announced January 2013.

    Comments: This paper is submitted to IEEE transactions on information theory. It was presented in part at ISIT2013 (IEEE International Symposium on Information Theory, Istanbul)

  14. On Capacity Regions of Discrete Asynchronous Multiple Access Channels

    Authors: Lóránt Farkas, Tamás Kói

    Abstract: A general formalization is given for asynchronous multiple access channels which admits different assumptions on delays. This general framework allows the analysis of so far unexplored models leading to new interesting capacity regions. In particular, a single letter characterization is given for the capacity region in case of 3 senders, 2 synchronous with each other and the third not synchronous… ▽ More

    Submitted 12 July, 2014; v1 submitted 11 April, 2012; originally announced April 2012.

    Comments: It has been presented in part at ISIT 2011, Saint Petersburg. This extended version is accepted for publication in Kybernetika