Zum Hauptinhalt springen

Showing 1–21 of 21 results for author: Kuo, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09627  [pdf, other

    cs.CV cs.AI eess.IV

    RobustSAM: Segment Anything Robustly on Degraded Images

    Authors: Wei-Ting Chen, Yu-Jiet Vong, Sy-Yen Kuo, Sizhuo Ma, Jian Wang

    Abstract: Segment Anything Model (SAM) has emerged as a transformative approach in image segmentation, acclaimed for its robust zero-shot segmentation capabilities and flexible prompting system. Nonetheless, its performance is challenged by images with degraded quality. Addressing this limitation, we propose the Robust Segment Anything Model (RobustSAM), which enhances SAM's performance on low-quality image… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: Accepted by CVPR2024 (Highlight); Project Page: https://robustsam.github.io/

  2. arXiv:2406.09622  [pdf, other

    cs.CV cs.AI eess.IV

    DSL-FIQA: Assessing Facial Image Quality via Dual-Set Degradation Learning and Landmark-Guided Transformer

    Authors: Wei-Ting Chen, Gurunandan Krishnan, Qiang Gao, Sy-Yen Kuo, Sizhuo Ma, Jian Wang

    Abstract: Generic Face Image Quality Assessment (GFIQA) evaluates the perceptual quality of facial images, which is crucial in improving image restoration algorithms and selecting high-quality face images for downstream tasks. We present a novel transformer-based method for GFIQA, which is aided by two unique mechanisms. First, a Dual-Set Degradation Representation Learning (DSL) mechanism uses facial image… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

    Comments: Accepted by CVPR 2024, Project Page: https://dsl-fiqa.github.io/

  3. arXiv:2405.10589  [pdf, other

    cs.CV cs.AI eess.IV

    Improving Point-based Crowd Counting and Localization Based on Auxiliary Point Guidance

    Authors: I-Hsiang Chen, Wei-Ting Chen, Yu-Wei Liu, Ming-Hsuan Yang, Sy-Yen Kuo

    Abstract: Crowd counting and localization have become increasingly important in computer vision due to their wide-ranging applications. While point-based strategies have been widely used in crowd counting methods, they face a significant challenge, i.e., the lack of an effective learning strategy to guide the matching process. This deficiency leads to instability in matching point proposals to target points… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  4. arXiv:2404.00270  [pdf, other

    cs.DC cs.DS

    Engineering A Workload-balanced Push-Relabel Algorithm for Massive Graphs on GPUs

    Authors: Chou-Ying Hsieh, Po-Chieh Lin, Sy-Yen Kuo

    Abstract: The push-relabel algorithm is an efficient algorithm that solves the maximum flow/ minimum cut problems of its affinity to parallelization. As the size of graphs grows exponentially, researchers have used Graphics Processing Units (GPUs) to accelerate the computation of the push-relabel algorithm further. However, prior works need to handle the significant memory consumption to represent a massive… ▽ More

    Submitted 30 March, 2024; originally announced April 2024.

  5. arXiv:2401.08422  [pdf, other

    cs.CV

    Improving Limited Supervised Foot Ulcer Segmentation Using Cross-Domain Augmentation

    Authors: Shang-Jui Kuo, Po-Han Huang, Chia-Ching Lin, Jeng-Lin Li, Ming-Ching Chang

    Abstract: Diabetic foot ulcers pose health risks, including higher morbidity, mortality, and amputation rates. Monitoring wound areas is crucial for proper care, but manual segmentation is subjective due to complex wound features and background variation. Expert annotations are costly and time-intensive, thus hampering large dataset creation. Existing segmentation models relying on extensive annotations are… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: 5 pages, 2 figures, accepted by ICASSP 2024

  6. arXiv:2401.05039  [pdf, other

    cs.DC

    Accelerating Maximal Biclique Enumeration on GPUs

    Authors: Chou-Ying Hsieh, Chia-Ming Chang, Po-Hsiu Cheng, Sy-Yen Kuo

    Abstract: Maximal Biclique Enumeration (MBE) holds critical importance in graph theory with applications extending across fields such as bioinformatics, social networks, and recommendation systems. However, its computational complexity presents barriers for efficiently scaling to large graphs. To address these challenges, we introduce cuMBE, a GPU-optimized parallel algorithm for MBE. Utilizing a unique dat… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  7. arXiv:2311.16646  [pdf, other

    cs.LG cs.CR

    Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective

    Authors: Ming-Yu Chung, Sheng-Yen Chou, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo, Tsung-Yi Ho

    Abstract: Dataset distillation offers a potential means to enhance data efficiency in deep learning. Recent studies have shown its ability to counteract backdoor risks present in original training samples. In this study, we delve into the theoretical aspects of backdoor attacks and dataset distillation based on kernel methods. We introduce two new theory-driven trigger pattern generation methods specialized… ▽ More

    Submitted 28 November, 2023; originally announced November 2023.

    Comments: 19 pages, 4 figures

  8. arXiv:2306.01209  [pdf, other

    cs.CV cs.AI eess.IV

    Counting Crowds in Bad Weather

    Authors: Zhi-Kai Huang, Wei-Ting Chen, Yuan-Chun Chiang, Sy-Yen Kuo, Ming-Hsuan Yang

    Abstract: Crowd counting has recently attracted significant attention in the field of computer vision due to its wide applications to image understanding. Numerous methods have been proposed and achieved state-of-the-art performance for real-world tasks. However, existing approaches do not perform well under adverse weather such as haze, rain, and snow since the visual appearances of crowds in such scenes a… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: including supplemental material

  9. arXiv:2303.11364  [pdf, other

    cs.CV

    DehazeNeRF: Multiple Image Haze Removal and 3D Shape Reconstruction using Neural Radiance Fields

    Authors: Wei-Ting Chen, Wang Yifan, Sy-Yen Kuo, Gordon Wetzstein

    Abstract: Neural radiance fields (NeRFs) have demonstrated state-of-the-art performance for 3D computer vision tasks, including novel view synthesis and 3D shape reconstruction. However, these methods fail in adverse weather conditions. To address this challenge, we introduce DehazeNeRF as a framework that robustly operates in hazy conditions. DehazeNeRF extends the volume rendering equation by adding physi… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Comments: including supplemental material; project page: https://www.computationalimaging.org/publications/dehazenerf

  10. arXiv:2211.00887  [pdf, other

    quant-ph cs.LG cs.NE eess.SP

    Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise

    Authors: Jhih-Cing Huang, Yu-Lin Tsai, Chao-Han Huck Yang, Cheng-Fang Su, Chia-Mu Yu, Pin-Yu Chen, Sy-Yen Kuo

    Abstract: Recently, quantum classifiers have been found to be vulnerable to adversarial attacks, in which quantum classifiers are deceived by imperceptible noises, leading to misclassification. In this paper, we propose the first theoretical study demonstrating that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks. We link the definition of diffe… ▽ More

    Submitted 28 April, 2023; v1 submitted 2 November, 2022; originally announced November 2022.

    Comments: Accepted to IEEE ICASSP 2023

  11. arXiv:2209.08630  [pdf, other

    cs.CV cs.AI cs.CY cs.GT eess.IV

    RVSL: Robust Vehicle Similarity Learning in Real Hazy Scenes Based on Semi-supervised Learning

    Authors: Wei-Ting Chen, I-Hsiang Chen, Chih-Yuan Yeh, Hao-Hsiang Yang, Hua-En Chang, Jian-Jiun Ding, Sy-Yen Kuo

    Abstract: Recently, vehicle similarity learning, also called re-identification (ReID), has attracted significant attention in computer vision. Several algorithms have been developed and obtained considerable success. However, most existing methods have unpleasant performance in the hazy scenario due to poor visibility. Though some strategies are possible to resolve this problem, they still have room to be i… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

    Comments: Accepted by ECCV 2022

  12. arXiv:2205.01569  [pdf, other

    cs.AR cs.LG eess.AS

    PSCNN: A 885.86 TOPS/W Programmable SRAM-based Computing-In-Memory Processor for Keyword Spotting

    Authors: Shu-Hung Kuo, Tian-Sheuan Chang

    Abstract: Computing-in-memory (CIM) has attracted significant attentions in recent years due to its massive parallelism and low power consumption. However, current CIM designs suffer from large area overhead of small CIM macros and bad programmablity for model execution. This paper proposes a programmable CIM processor with a single large sized CIM macro instead of multiple smaller ones for power efficient… ▽ More

    Submitted 2 May, 2022; originally announced May 2022.

    Comments: 5 pages, 7 figures, published in IEEE ISCAS 2022

  13. arXiv:2111.12925  [pdf, other

    cs.CV cs.AI cs.LG eess.IV eess.SP

    ContourletNet: A Generalized Rain Removal Architecture Using Multi-Direction Hierarchical Representation

    Authors: Wei-Ting Chen, Cheng-Che Tsai, Hao-Yu Fang, I-Hsiang Chen, Jian-Jiun Ding, Sy-Yen Kuo

    Abstract: Images acquired from rainy scenes usually suffer from bad visibility which may damage the performance of computer vision applications. The rainy scenarios can be categorized into two classes: moderate rain and heavy rain scenes. Moderate rain scene mainly consists of rain streaks while heavy rain scene contains both rain streaks and the veiling effect (similar to haze). Although existing methods h… ▽ More

    Submitted 25 November, 2021; originally announced November 2021.

    Comments: This paper is accepted by BMVC 2021

  14. arXiv:2105.00690  [pdf, other

    cs.CV

    Multi-modal Bifurcated Network for Depth Guided Image Relighting

    Authors: Hao-Hsiang Yang, Wei-Ting Chen, Hao-Lun Luo, Sy-Yen Kuo

    Abstract: Image relighting aims to recalibrate the illumination setting in an image. In this paper, we propose a deep learning-based method called multi-modal bifurcated network (MBNet) for depth guided image relighting. That is, given an image and the corresponding depth maps, a new image with the given illuminant angle and color temperature is generated by our network. This model extracts the image and th… ▽ More

    Submitted 4 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: Accepted by CVPRW 2021. This solution is the winner in the NTIRE 2021 Depth Guide One-to-one Relighting Challenge

  15. arXiv:2105.00681  [pdf, other

    cs.CV

    S3Net: A Single Stream Structure for Depth Guided Image Relighting

    Authors: Hao-Hsiang Yang, Wei-Ting Chen, and Sy-Yen Kuo

    Abstract: Depth guided any-to-any image relighting aims to generate a relit image from the original image and corresponding depth maps to match the illumination setting of the given guided image and its depth map. To the best of our knowledge, this task is a new challenge that has not been addressed in the previous literature. To address this issue, we propose a deep learning-based neural Single Stream Stru… ▽ More

    Submitted 4 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

    Comments: Accepted by CVPRW 2021. This solution obtains the 3 rd position in the NTIRE 2021 Depth Guided Any-to-any Relighting Challenge

  16. Whose Side are Ethics Codes On? Power, Responsibility and the Social Good

    Authors: Anne L. Washington, Rachel S. Kuo

    Abstract: The moral authority of ethics codes stems from an assumption that they serve a unified society, yet this ignores the political aspects of any shared resource. The sociologist Howard S. Becker challenged researchers to clarify their power and responsibility in the classic essay: Whose Side Are We On. Building on Becker's hierarchy of credibility, we report on a critical discourse analysis of data e… ▽ More

    Submitted 4 February, 2020; originally announced February 2020.

    Comments: Conference on Fairness, Accountability, and Transparency (FAT* '20), January 27-30, 2020, Barcelona, Spain. Corrected

  17. arXiv:1506.06366  [pdf

    cs.CE cs.AI cs.NE

    A Novel Method for Stock Forecasting based on Fuzzy Time Series Combined with the Longest Common/Repeated Sub-sequence

    Authors: He-Wen Chen, Zih-Ci Wang, Shu-Yu Kuo, Yao-Hsin Chou

    Abstract: Stock price forecasting is an important issue for investors since extreme accuracy in forecasting can bring about high profits. Fuzzy Time Series (FTS) and Longest Common/Repeated Sub-sequence (LCS/LRS) are two important issues for forecasting prices. However, to the best of our knowledge, there are no significant studies using LCS/LRS to predict stock prices. It is impossible that prices stay exa… ▽ More

    Submitted 21 June, 2015; originally announced June 2015.

  18. arXiv:1306.3664  [pdf, other

    quant-ph cs.ET

    Fault-tolerant Operations for Universal Blind Quantum Computation

    Authors: Chia-Hung Chien, Rodney Van Meter, Sy-Yen Kuo

    Abstract: Blind quantum computation is an appealing use of quantum information technology because it can conceal both the client's data and the algorithm itself from the server. However, problems need to be solved in the practical use of blind quantum computation and fault-tolerance is a major challenge. On an example circuit, the computational cost measured in T gates executed by the client is 97 times mor… ▽ More

    Submitted 16 June, 2013; originally announced June 2013.

    Journal ref: JETC 12(1), 9 (2015)

  19. Lost in translation: data integration tools meet the Semantic Web (experiences from the Ondex project)

    Authors: Andrea Splendiani, Chris J Rawlings, Shao-Chih Kuo, Robert Stevens, Phillip Lord

    Abstract: More information is now being published in machine processable form on the web and, as de-facto distributed knowledge bases are materializing, partly encouraged by the vision of the Semantic Web, the focus is shifting from the publication of this information to its consumption. Platforms for data integration, visualization and analysis that are based on a graph representation of information appear… ▽ More

    Submitted 24 March, 2011; originally announced March 2011.

    Comments: Presented at DEIT, Data Engineering and Internet Technology, 2011 IEEE: CFP1113L-CDR

  20. arXiv:0911.4239  [pdf, ps, other

    cs.NI cs.CR cs.DS

    Constrained Function Based En-Route Filtering for Sensor Networks

    Authors: Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo

    Abstract: Sensor networks are vulnerable to \emph{false data injection attack} and \emph{path-based DoS} (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an \emph{en-route filtering} scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based me… ▽ More

    Submitted 22 November, 2009; originally announced November 2009.

    Comments: 26 pages, single column, extension from a preliminary version appeared in IEEE WCNC 2009

  21. arXiv:0911.4238  [pdf, ps, other

    cs.NI cs.CR cs.DS

    Secure Multidimensional Queries in Tiered Sensor Networks

    Authors: Chia-Mu Yu, Chun-Shien Lu, Sy-Yen Kuo

    Abstract: In this paper, aiming at securing range query, top-k query, and skyline query in tiered sensor networks, we propose the Secure Range Query (SRQ), Secure Top-$k$ Query (STQ), and Secure Skyline Query (SSQ) schemes, respectively. In particular, SRQ, by using our proposed \emph{prime aggregation} technique, has the lowest communication overhead among prior works, while STQ and SSQ, to our knowledge… ▽ More

    Submitted 16 December, 2009; v1 submitted 22 November, 2009; originally announced November 2009.