Zum Hauptinhalt springen

Showing 1–47 of 47 results for author: Le, T H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.17803  [pdf, other

    cs.SE cs.CR cs.LG

    Automatic Data Labeling for Software Vulnerability Prediction Models: How Far Are We?

    Authors: Triet H. M. Le, M. Ali Babar

    Abstract: Background: Software Vulnerability (SV) prediction needs large-sized and high-quality data to perform well. Current SV datasets mostly require expensive labeling efforts by experts (human-labeled) and thus are limited in size. Meanwhile, there are growing efforts in automatic SV labeling at scale. However, the fitness of auto-labeled data for SV prediction is still largely unknown. Aims: We quanti… ▽ More

    Submitted 25 July, 2024; originally announced July 2024.

    Comments: Accepted as a full paper in the technical track at The International Symposium on Empirical Software Engineering and Measurement (ESEM) 2024

  2. arXiv:2407.17053  [pdf, other

    cs.SE cs.CR cs.LG

    Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

    Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar

    Abstract: Background: The C and C++ languages hold significant importance in Software Engineering research because of their widespread use in practice. Numerous studies have utilized Machine Learning (ML) and Deep Learning (DL) techniques to detect software vulnerabilities (SVs) in the source code written in these languages. However, the application of these techniques in function-level SV assessment has be… ▽ More

    Submitted 3 August, 2024; v1 submitted 24 July, 2024; originally announced July 2024.

    Comments: Accepted as a full paper in the technical track at The International Symposium on Empirical Software Engineering and Measurement (ESEM) 2024

  3. arXiv:2407.10722  [pdf, other

    cs.SE cs.CR cs.LG

    Mitigating Data Imbalance for Software Vulnerability Assessment: Does Data Augmentation Help?

    Authors: Triet H. M. Le, M. Ali Babar

    Abstract: Background: Software Vulnerability (SV) assessment is increasingly adopted to address the ever-increasing volume and complexity of SVs. Data-driven approaches have been widely used to automate SV assessment tasks, particularly the prediction of the Common Vulnerability Scoring System (CVSS) metrics such as exploitability, impact, and severity. SV assessment suffers from the imbalanced distribution… ▽ More

    Submitted 15 July, 2024; originally announced July 2024.

    Comments: Accepted as a full paper in the technical track at The International Symposium on Empirical Software Engineering and Measurement (ESEM) 2024

  4. arXiv:2406.19765  [pdf, other

    cs.SE cs.LG

    Systematic Literature Review on Application of Learning-based Approaches in Continuous Integration

    Authors: Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, M. Ali Babar

    Abstract: Context: Machine learning (ML) and deep learning (DL) analyze raw data to extract valuable insights in specific phases. The rise of continuous practices in software projects emphasizes automating Continuous Integration (CI) with these learning-based methods, while the growing adoption of such approaches underscores the need for systematizing knowledge. Objective: Our objective is to comprehensivel… ▽ More

    Submitted 2 July, 2024; v1 submitted 28 June, 2024; originally announced June 2024.

    Comments: This paper has been accepted to be published in IEEE Access

  5. arXiv:2404.17110  [pdf, other

    cs.SE cs.CR cs.LG

    Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT

    Authors: Triet H. M. Le, M. Ali Babar, Tung Hoang Thai

    Abstract: Background: Software Vulnerability (SV) prediction in emerging languages is increasingly important to ensure software security in modern systems. However, these languages usually have limited SV data for developing high-performing prediction models. Aims: We conduct an empirical study to evaluate the impact of SV data scarcity in emerging languages on the state-of-the-art SV prediction model and i… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: Accepted in the 4th International Workshop on Software Security co-located with the 28th International Conference on Evaluation and Assessment in Software Engineering (EASE) 2024

  6. arXiv:2401.11105  [pdf, other

    cs.SE cs.CR cs.LG

    Are Latent Vulnerabilities Hidden Gems for Software Vulnerability Prediction? An Empirical Study

    Authors: Triet H. M. Le, Xiaoning Du, M. Ali Babar

    Abstract: Collecting relevant and high-quality data is integral to the development of effective Software Vulnerability (SV) prediction models. Most of the current SV datasets rely on SV-fixing commits to extract vulnerable functions and lines. However, none of these datasets have considered latent SVs existing between the introduction and fix of the collected SVs. There is also little known about the useful… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

    Comments: Accepted as a full paper in the technical track at the 21st International Conference on Mining Software Repositories (MSR) 2024

  7. arXiv:2312.07740  [pdf, other

    cs.CV

    HAtt-Flow: Hierarchical Attention-Flow Mechanism for Group Activity Scene Graph Generation in Videos

    Authors: Naga VS Raviteja Chappa, Pha Nguyen, Thi Hoang Ngan Le, Khoa Luu

    Abstract: Group Activity Scene Graph (GASG) generation is a challenging task in computer vision, aiming to anticipate and describe relationships between subjects and objects in video sequences. Traditional Video Scene Graph Generation (VidSGG) methods focus on retrospective analysis, limiting their predictive capabilities. To enrich the scene understanding capabilities, we introduced a GASG dataset extendin… ▽ More

    Submitted 28 November, 2023; originally announced December 2023.

    Comments: 11 pages, 5 figures, 6 tables

  8. arXiv:2310.11750  [pdf, ps, other

    cs.NI cs.IT

    Min-max Decoding Error Probability Optimization in RIS-Aided Hybrid TDMA-NOMA Networks

    Authors: Tra Huong Thi Le, Yan Kyaw Tun

    Abstract: One of the primary objectives for future wireless communication networks is to facilitate the provision of ultra-reliable and low-latency communication services while simultaneously ensuring the capability for vast connection. In order to achieve this objective, we examine a hybrid multi-access scheme inside the finite blocklength (FBL) regime. This system combines the benefits of non-orthogonal m… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Comments: 11 pages, 7 figures

  9. arXiv:2309.06956  [pdf, other

    eess.IV cs.AI cs.LG

    Implicit Neural Multiple Description for DNA-based data storage

    Authors: Trung Hieu Le, Xavier Pic, Jeremy Mateos, Marc Antonini

    Abstract: DNA exhibits remarkable potential as a data storage solution due to its impressive storage density and long-term stability, stemming from its inherent biomolecular structure. However, developing this novel medium comes with its own set of challenges, particularly in addressing errors arising from storage and biological manipulations. These challenges are further conditioned by the structural const… ▽ More

    Submitted 13 September, 2023; originally announced September 2023.

    Comments: Xavier Pic and Trung Hieu Le are both equal contributors and primary authors

  10. arXiv:2307.01558  [pdf, other

    cs.LG cs.AI

    Scalable variable selection for two-view learning tasks with projection operators

    Authors: Sandor Szedmak, Riikka Huusari, Tat Hong Duong Le, Juho Rousu

    Abstract: In this paper we propose a novel variable selection method for two-view settings, or for vector-valued supervised learning problems. Our framework is able to handle extremely large scale selection tasks, where number of data samples could be even millions. In a nutshell, our method performs variable selection by iteratively selecting variables that are highly correlated with the output variables,… ▽ More

    Submitted 4 July, 2023; originally announced July 2023.

    Comments: 17 pages, 15 PDF figures

  11. arXiv:2305.15374  [pdf, other

    cs.CL cs.AI cs.LG

    ASPER: Answer Set Programming Enhanced Neural Network Models for Joint Entity-Relation Extraction

    Authors: Trung Hoang Le, Huiping Cao, Tran Cao Son

    Abstract: A plethora of approaches have been proposed for joint entity-relation (ER) extraction. Most of these methods largely depend on a large amount of manually annotated training data. However, manual data annotation is time consuming, labor intensive, and error prone. Human beings learn using both data (through induction) and knowledge (through deduction). Answer Set Programming (ASP) has been a widely… ▽ More

    Submitted 24 May, 2023; originally announced May 2023.

  12. arXiv:2305.12736   

    cs.SE

    Mitigating ML Model Decay in Continuous Integration with Data Drift Detection: An Empirical Study

    Authors: Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: Background: Machine Learning (ML) methods are being increasingly used for automating different activities, e.g., Test Case Prioritization (TCP), of Continuous Integration (CI). However, ML models need frequent retraining as a result of changes in the CI environment, more commonly known as data drift. Also, continuously retraining ML models consume a lot of time and effort. Hence, there is an urgen… ▽ More

    Submitted 17 July, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: This paper got a rejection and we need to address the comments and upload the new version with new results

  13. arXiv:2305.12695   

    cs.SE cs.LG

    Systematic Literature Review on Application of Machine Learning in Continuous Integration

    Authors: Ali Kazemi Arani, Triet Huynh Minh Le, Mansooreh Zahedi, Muhammad Ali Babar

    Abstract: This research conducted a systematic review of the literature on machine learning (ML)-based methods in the context of Continuous Integration (CI) over the past 22 years. The study aimed to identify and describe the techniques used in ML-based solutions for CI and analyzed various aspects such as data engineering, feature engineering, hyper-parameter tuning, ML models, evaluation methods, and metr… ▽ More

    Submitted 17 July, 2023; v1 submitted 22 May, 2023; originally announced May 2023.

    Comments: This paper got a rejection and we need to address the comments and upload the new version with new results

  14. arXiv:2304.02829  [pdf, other

    cs.SE cs.LG

    SoK: Machine Learning for Continuous Integration

    Authors: Ali Kazemi Arani, Mansooreh Zahedi, Triet Huynh Minh Le, Muhammad Ali Babar

    Abstract: Continuous Integration (CI) has become a well-established software development practice for automatically and continuously integrating code changes during software development. An increasing number of Machine Learning (ML) based approaches for automation of CI phases are being reported in the literature. It is timely and relevant to provide a Systemization of Knowledge (SoK) of ML-based approaches… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

    Comments: 6 pages, 2 figures, accepted in the ICSE'23 Workshop on Cloud Intelligence / AIOps

  15. Stag hunt game-based approach for cooperative UAVs

    Authors: L. V. Nguyen, I. Torres Herrera, T. H. Le, M. D. Phung, R. P. Aguilera, Q. P. Ha

    Abstract: Unmanned aerial vehicles (UAVs) are being employed in many areas such as photography, emergency, entertainment, defence, agriculture, forestry, mining and construction. Over the last decade, UAV technology has found applications in numerous construction project phases, ranging from site mapping, progress monitoring, building inspection, damage assessments, and material delivery. While extensive st… ▽ More

    Submitted 28 August, 2022; originally announced August 2022.

    Comments: in 2022 Proceedings of 39th International Symposium on Automation and Robotics in Construction, Pages 367-374, Bogotá, Colombia, ISBN 978-952-69524-2-0, ISSN 2413-5844

  16. arXiv:2207.14459  [pdf, other

    cs.IT eess.SP

    Generalized BER of MCIK-OFDM with Imperfect CSI: Selection combining GD versus ML receivers

    Authors: Vu-Duc Ngo, Thien Van Luong, Nguyen Cong Luong, Minh-Tuan Le, Thi Thanh Huyen Le, Xuan-Nam Tran

    Abstract: This paper analyzes the bit error rate (BER) of multicarrier index keying - orthogonal frequency division multiplexing (MCIK-OFDM) with selection combining (SC) diversity reception. Particularly, we propose a generalized framework to derive the BER for both the low-complexity greedy detector (GD) and maximum likelihood (ML) detector. Based on this, closedform expressions for the BERs of MCIK-OFDM… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  17. arXiv:2207.14454  [pdf, other

    cs.IT eess.SP

    Enhancing Diversity of OFDM with Joint Spread Spectrum and Subcarrier Index Modulations

    Authors: Vu-Duc Ngo, Thien Van Luong, Nguyen Cong Luong, Mai Xuan Trang, Minh-Tuan Le, Thi Thanh Huyen Le, Xuan-Nam Tran

    Abstract: This paper proposes a novel spread spectrum and sub-carrier index modulation (SS-SIM) scheme, which is integrated to orthogonal frequency division multiplexing (OFDM) framework to enhance the diversity over the conventional IM schemes. Particularly, the resulting scheme, called SS-SIMOFDM, jointly employs both spread spectrum and sub-carrier index modulations to form a precoding vector which is th… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  18. arXiv:2207.11708  [pdf, other

    cs.SE cs.CR cs.LG

    Towards an Improved Understanding of Software Vulnerability Assessment Using Data-Driven Approaches

    Authors: Triet H. M. Le

    Abstract: The thesis advances the field of software security by providing knowledge and automation support for software vulnerability assessment using data-driven approaches. Software vulnerability assessment provides important and multifaceted information to prevent and mitigate dangerous cyber-attacks in the wild. The key contributions include a systematisation of knowledge, along with a suite of novel da… ▽ More

    Submitted 20 June, 2023; v1 submitted 24 July, 2022; originally announced July 2022.

    Comments: A thesis submitted for the degree of Doctor of Philosophy at The University of Adelaide. The official version of the thesis can be found at the institutional repository: https://hdl.handle.net/2440/135914

  19. arXiv:2205.09299  [pdf, other

    cs.CV

    3DConvCaps: 3DUnet with Convolutional Capsule Encoder for Medical Image Segmentation

    Authors: Minh Tran, Viet-Khoa Vo-Ho, Ngan T. H. Le

    Abstract: Convolutional Neural Networks (CNNs) have achieved promising results in medical image segmentation. However, CNNs require lots of training data and are incapable of handling pose and deformation of objects. Furthermore, their pooling layers tend to discard important information such as positions as well as CNNs are sensitive to rotation and affine transformation. Capsule network is a recent new ar… ▽ More

    Submitted 25 June, 2022; v1 submitted 18 May, 2022; originally announced May 2022.

    Comments: Accepted to ICPR 2022

  20. arXiv:2203.08417  [pdf, other

    cs.SE cs.CR cs.LG

    On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

    Authors: Triet H. M. Le, M. Ali Babar

    Abstract: Many studies have developed Machine Learning (ML) approaches to detect Software Vulnerabilities (SVs) in functions and fine-grained code statements that cause such SVs. However, there is little work on leveraging such detection outputs for data-driven SV assessment to give information about exploitability, impact, and severity of SVs. The information is important to understand SVs and prioritize t… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Accepted as a full paper in the technical track at the 19th International Conference on Mining Software Repositories (MSR) 2022

  21. DAM-AL: Dilated Attention Mechanism with Attention Loss for 3D Infant Brain Image Segmentation

    Authors: Dinh-Hieu Hoang, Gia-Han Diep, Minh-Triet Tran, Ngan T. H Le

    Abstract: While Magnetic Resonance Imaging (MRI) has played an essential role in infant brain analysis, segmenting MRI into a number of tissues such as gray matter (GM), white matter (WM), and cerebrospinal fluid (CSF) is crucial and complex due to the extremely low intensity contrast between tissues at around 6-9 months of age as well as amplified noise, myelination, and incomplete volume. In this paper, w… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

  22. arXiv:2109.04029  [pdf, other

    cs.CR cs.AI cs.LG

    Automated Security Assessment for the Internet of Things

    Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar

    Abstract: Internet of Things (IoT) based applications face an increasing number of potential security risks, which need to be systematically assessed and addressed. Expert-based manual assessment of IoT security is a predominant approach, which is usually inefficient. To address this problem, we propose an automated security assessment framework for IoT networks. Our framework first leverages machine learni… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

    Comments: Accepted for publication at the 26th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2021)

  23. arXiv:2108.08041  [pdf, other

    cs.SE cs.CR cs.LG

    DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning

    Authors: Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

    Abstract: It is increasingly suggested to identify Software Vulnerabilities (SVs) in code commits to give early warnings about potential security risks. However, there is a lack of effort to assess vulnerability-contributing commits right after they are detected to provide timely information about the exploitability, impact and severity of SVs. Such information is important to plan and prioritize the mitiga… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: Accepted as a full paper at the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2021

  24. arXiv:2107.08364  [pdf, other

    cs.SE cs.AI cs.CR cs.LG

    A Survey on Data-driven Software Vulnerability Assessment and Prioritization

    Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar

    Abstract: Software Vulnerabilities (SVs) are increasing in complexity and scale, posing great security risks to many software systems. Given the limited resources in practice, SV assessment and prioritization help practitioners devise optimal SV mitigation plans based on various SV characteristics. The surges in SV data sources and data-driven techniques such as Machine Learning and Deep Learning have taken… ▽ More

    Submitted 3 April, 2022; v1 submitted 18 July, 2021; originally announced July 2021.

    Comments: Accepted for publication in the ACM Computing Surveys journal (CSUR), 2022

    Journal ref: ACM Comput. Surv., 55, 5 (2022), Article 100

  25. arXiv:2107.00845  [pdf, other

    cs.NI eess.SP

    A Business Model for Resource Sharing in Cell-Free UAVs-Assisted Wireless Networks

    Authors: Yan Kyaw Tun, Yu Min Park, Tra Huong Thi Le, Zhu Han, Choong Seon Hong

    Abstract: Unmanned aerial vehicles (UAVs) are widely deployed to enhance the wireless network capacity and to provide communication services to mobile users beyond the infrastructure coverage. Recently, with the help of a promising technology called network virtualization, multiple service providers (SPs) can share the infrastructures and wireless resources owned by the mobile network operators (MNOs). Then… ▽ More

    Submitted 2 July, 2021; originally announced July 2021.

    Comments: This paper has been submitted to IEEE Transactions on Vehicular Technology

  26. arXiv:2103.12350  [pdf, other

    eess.IV cs.CV

    Roughness Index and Roughness Distance for Benchmarking Medical Segmentation

    Authors: Vidhiwar Singh Rathour, Kashu Yamakazi, T. Hoang Ngan Le

    Abstract: Medical image segmentation is one of the most challenging tasks in medical image analysis and has been widely developed for many clinical applications. Most of the existing metrics have been first designed for natural images and then extended to medical images. While object surface plays an important role in medical segmentation and quantitative analysis i.e. analyze brain tumor surface, measure g… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: Paper has been accepted at BIOIMAGING2021

  27. Automated Software Vulnerability Assessment with Concept Drift

    Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar

    Abstract: Software Engineering researchers are increasingly using Natural Language Processing (NLP) techniques to automate Software Vulnerabilities (SVs) assessment using the descriptions in public repositories. However, the existing NLP-based approaches suffer from concept drift. This problem is caused by a lack of proper treatment of new (out-of-vocabulary) terms for the evaluation of unseen SVs over time… ▽ More

    Submitted 21 March, 2021; originally announced March 2021.

    Comments: Published as a full paper at the 16th International Conference on Mining Software Repositories 2019

    Journal ref: Proceedings of the 16th International Conference on Mining Software Repositories, 2019, pp. 371-382

  28. arXiv:2103.09042  [pdf, ps, other

    eess.IV cs.CV

    Invertible Residual Network with Regularization for Effective Medical Image Segmentation

    Authors: Kashu Yamazaki, Vidhiwar Singh Rathour, T. Hoang Ngan Le

    Abstract: Deep Convolutional Neural Networks (CNNs) i.e. Residual Networks (ResNets) have been used successfully for many computer vision tasks, but are difficult to scale to 3D volumetric medical data. Memory is increasingly often the bottleneck when training 3D Convolutional Neural Networks (CNNs). Recently, invertible neural networks have been applied to significantly reduce activation memory footprint w… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

  29. arXiv:2102.10378  [pdf, other

    cs.CV

    Self-Supervised Learning via multi-Transformation Classification for Action Recognition

    Authors: Duc Quang Vu, Ngan T. H. Le, Jia-Ching Wang

    Abstract: Self-supervised tasks have been utilized to build useful representations that can be used in downstream tasks when the annotation is unavailable. In this paper, we introduce a self-supervised video representation learning method based on the multi-transformation classification to efficiently classify human actions. Self-supervised learning on various transformations not only provides richer contex… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

  30. arXiv:2009.10269  [pdf, other

    cs.LG cs.GT cs.NI

    An Incentive Mechanism for Federated Learning in Wireless Cellular network: An Auction Approach

    Authors: Tra Huong Thi Le, Nguyen H. Tran, Yan Kyaw Tun, Minh N. H. Nguyen, Shashi Raj Pandey, Zhu Han, Choong Seon Hong

    Abstract: Federated Learning (FL) is a distributed learning framework that can deal with the distributed issue in machine learning and still guarantee high learning performance. However, it is impractical that all users will sacrifice their resources to join the FL algorithm. This motivates us to study the incentive mechanism design for FL. In this paper, we consider a FL system that involves one base stati… ▽ More

    Submitted 21 September, 2020; originally announced September 2020.

    Journal ref: Paper-TW-Apr-20-0557(2020)

  31. A Large-scale Study of Security Vulnerability Support on Developer Q&A Websites

    Authors: Triet H. M. Le, Roland Croft, David Hin, M. Ali Babar

    Abstract: Context: Security Vulnerabilities (SVs) pose many serious threats to software systems. Developers usually seek solutions to addressing these SVs on developer Question and Answer (Q&A) websites. However, there is still little known about on-going SV-specific discussions on different developer Q&A sites. Objective: We present a large-scale empirical study to understand developers' SV discussions and… ▽ More

    Submitted 21 April, 2021; v1 submitted 10 August, 2020; originally announced August 2020.

    Comments: Accepted for publication at the 25th International Conference on Evaluation and Assessment in Software Engineering (EASE 2021)

  32. arXiv:2003.03741  [pdf

    cs.SE cs.IR cs.LG

    PUMiner: Mining Security Posts from Developer Question and Answer Websites with PU Learning

    Authors: Triet H. M. Le, David Hin, Roland Croft, M. Ali Babar

    Abstract: Security is an increasing concern in software development. Developer Question and Answer (Q&A) websites provide a large amount of security discussion. Existing studies have used human-defined rules to mine security discussions, but these works still miss many posts, which may lead to an incomplete analysis of the security practices reported on Q&A websites. Traditional supervised Machine Learning… ▽ More

    Submitted 8 March, 2020; originally announced March 2020.

    Comments: Accepted for publication at the 17th Mining Software Repositories 2020 conference

  33. arXiv:2002.05442  [pdf, other

    cs.SE cs.AI cs.LG

    Deep Learning for Source Code Modeling and Generation: Models, Applications and Challenges

    Authors: Triet H. M. Le, Hao Chen, M. Ali Babar

    Abstract: Deep Learning (DL) techniques for Natural Language Processing have been evolving remarkably fast. Recently, the DL advances in language modeling, machine translation and paragraph understanding are so prominent that the potential of DL in Software Engineering cannot be overlooked, especially in the field of program learning. To facilitate further research and applications of DL in this field, we p… ▽ More

    Submitted 13 February, 2020; originally announced February 2020.

    Journal ref: ACM Comput. Surv., 53, 3 (2020), Article 62

  34. arXiv:1906.05168  [pdf, other

    stat.ML cs.LG

    Attention-based Multi-Input Deep Learning Architecture for Biological Activity Prediction: An Application in EGFR Inhibitors

    Authors: Huy Ngoc Pham, Trung Hoang Le

    Abstract: Machine learning and deep learning have gained popularity and achieved immense success in Drug discovery in recent decades. Historically, machine learning and deep learning models were trained on either structural data or chemical properties by separated model. In this study, we proposed an architecture training simultaneously both type of data in order to improve the overall performance. Given th… ▽ More

    Submitted 17 September, 2019; v1 submitted 12 June, 2019; originally announced June 2019.

    Comments: 2019 11th International Conference on Knowledge and Systems Engineering (KSE) - SS: Bioinformatics and Computational Biology (BCB) - Camera-ready version Aug 20th, 2019

    Report number: 31

  35. arXiv:1901.02529  [pdf

    cs.CV cs.MM

    A Spatial-temporal 3D Human Pose Reconstruction Framework

    Authors: X. T. Nguyen, T. D. Ngo, T. H. Le

    Abstract: 3D human pose reconstruction from single-view camera is a difficult and challenging topic. Many approaches have been proposed, but almost focusing on frame-by-frame independently while inter-frames are highly correlated in a pose sequence. In contrast, we introduce a novel spatial-temporal 3D reconstruction framework that leverages both intra and inter frame relationships in consecutive 2D pose se… ▽ More

    Submitted 10 January, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: 10 pages. JIPS Journal 2018

  36. arXiv:1811.06616  [pdf, other

    cs.MM

    Motion Style Extraction Based on Sparse Coding Decomposition

    Authors: Xuan Thanh Nguyen, Thanh Ha Le, Hongchuan Yu

    Abstract: We present a sparse coding-based framework for motion style decomposition and synthesis. Dynamic Time Warping is firstly used to synchronized input motions in the time domain as a pre-processing step. A sparse coding-based decomposition has been proposed, we also introduce the idea of core component and basic motion. Decomposed motions are then combined, transfer to synthesize new motions. Lastly,… ▽ More

    Submitted 15 November, 2018; originally announced November 2018.

    Comments: Presented at ACM SIGGRAPH ASIA Workshop: Data-Driven Animation Techniques (D2AT)

  37. arXiv:1810.07535  [pdf, other

    cs.CV

    Virtual Wave Optics for Non-Line-of-Sight Imaging

    Authors: Xiaochun Liu, Ibón Guillén, Marco La Manna, Ji Hyun Nam, Syed Azer Reza, Toan Huu Le, Diego Gutierrez, Adrian Jarabo, Andreas Velten

    Abstract: Non-Line-of-Sight (NLOS) imaging allows to observe objects partially or fully occluded from direct view, by analyzing indirect diffuse reflections off a secondary, relay surface. Despite its many potential applications, existing methods lack practical usability due to several shared limitations, including the assumption of single scattering only, lack of occlusions, and Lambertian reflectance. We… ▽ More

    Submitted 6 August, 2019; v1 submitted 17 October, 2018; originally announced October 2018.

    Comments: 19 pages, 6 figures

  38. arXiv:1810.04752  [pdf, other

    cs.CV

    Deep Recurrent Level Set for Segmenting Brain Tumors

    Authors: T. Hoang Ngan Le, Raajitha Gummadi, Marios Savvides

    Abstract: Variational Level Set (VLS) has been a widely used method in medical segmentation. However, segmentation accuracy in the VLS method dramatically decreases when dealing with intervening factors such as lighting, shadows, colors, etc. Additionally, results are quite sensitive to initial settings and are highly dependent on the number of iterations. In order to address these limitations, the proposed… ▽ More

    Submitted 10 October, 2018; originally announced October 2018.

    Journal ref: booktitle="Medical Image Computing and Computer Assisted Intervention -- MICCAI 2018", year="2018", publisher="Springer International Publishing",

  39. arXiv:1711.10520  [pdf, other

    cs.CV

    Learning from Longitudinal Face Demonstration - Where Tractable Deep Modeling Meets Inverse Reinforcement Learning

    Authors: Chi Nhan Duong, Kha Gia Quach, Khoa Luu, T. Hoang Ngan Le, Marios Savvides, Tien D. Bui

    Abstract: This paper presents a novel Subject-dependent Deep Aging Path (SDAP), which inherits the merits of both Generative Probabilistic Modeling and Inverse Reinforcement Learning to model the facial structures and the longitudinal face aging process of a given subject. The proposed SDAP is optimized using tractable log-likelihood objective functions with Convolutional Neural Networks (CNNs) based deep f… ▽ More

    Submitted 2 February, 2019; v1 submitted 28 November, 2017; originally announced November 2017.

  40. arXiv:1704.03594  [pdf, other

    cs.CV

    Deep Contextual Recurrent Residual Networks for Scene Labeling

    Authors: T. Hoang Ngan Le, Chi Nhan Duong, Ligong Han, Khoa Luu, Marios Savvides, Dipan Pal

    Abstract: Designed as extremely deep architectures, deep residual networks which provide a rich visual representation and offer robust convergence behaviors have recently achieved exceptional performance in numerous computer vision problems. Being directly applied to a scene labeling problem, however, they were limited to capture long-range contextual dependence, which is a critical aspect. To address this… ▽ More

    Submitted 11 April, 2017; originally announced April 2017.

  41. arXiv:1703.08617  [pdf, other

    cs.CV

    Temporal Non-Volume Preserving Approach to Facial Age-Progression and Age-Invariant Face Recognition

    Authors: Chi Nhan Duong, Kha Gia Quach, Khoa Luu, T. Hoang Ngan le, Marios Savvides

    Abstract: Modeling the long-term facial aging process is extremely challenging due to the presence of large and non-linear variations during the face development stages. In order to efficiently address the problem, this work first decomposes the aging process into multiple short-term stages. Then, a novel generative probabilistic model, named Temporal Non-Volume Preserving (TNVP) transformation, is presente… ▽ More

    Submitted 24 March, 2017; originally announced March 2017.

  42. arXiv:1612.05322  [pdf

    cs.CV

    Towards a Deep Learning Framework for Unconstrained Face Detection

    Authors: Yutong Zheng, Chenchen Zhu, Khoa Luu, Chandrasekhar Bhagavatula, T. Hoang Ngan Le, Marios Savvides

    Abstract: Robust face detection is one of the most important pre-processing steps to support facial expression analysis, facial landmarking, face recognition, pose estimation, building of 3D facial models, etc. Although this topic has been intensely studied for decades, it is still challenging due to numerous variants of face images in real-world scenarios. In this paper, we present a novel approach named M… ▽ More

    Submitted 2 January, 2017; v1 submitted 15 December, 2016; originally announced December 2016.

    Comments: Accepted by BTAS 2016. arXiv admin note: substantial text overlap with arXiv:1606.05413

  43. arXiv:1412.7373  [pdf, ps, other

    math.NT cs.CC

    On primitive elements in finite fields of low characteristic

    Authors: Abhishek Bhowmick, Thái Hoàng Lê

    Abstract: We discuss the problem of constructing a small subset of a finite field containing primitive elements of the field. Given a finite field, $\mathbb{F}_{q^n}$, small $q$ and large $n$, we show that the set of all low degree polynomials contains the expected number of primitive elements. The main theorem we prove is a bound for character sums over short intervals in function fields. Our result is u… ▽ More

    Submitted 20 December, 2014; originally announced December 2014.

    MSC Class: 11Lxx ACM Class: G.2

  44. arXiv:1410.7253  [pdf, ps, other

    cs.CC

    Deterministic Extractors for Additive Sources

    Authors: Abhishek Bhowmick, Ariel Gabizon, Thái Hoàng Lê, David Zuckerman

    Abstract: We propose a new model of a weakly random source that admits randomness extraction. Our model of additive sources includes such natural sources as uniform distributions on arithmetic progressions (APs), generalized arithmetic progressions (GAPs), and Bohr sets, each of which generalizes affine sources. We give an explicit extractor for additive sources with linear min-entropy over both… ▽ More

    Submitted 27 October, 2014; originally announced October 2014.

  45. arXiv:1209.6151  [pdf

    cs.CV

    Face Alignment Using Active Shape Model And Support Vector Machine

    Authors: Thai Hoang Le, Truong Nhat Vo

    Abstract: The Active Shape Model (ASM) is one of the most popular local texture models for face alignment. It applies in many fields such as locating facial features in the image, face synthesis, etc. However, the experimental results show that the accuracy of the classical ASM for some applications is not high. This paper suggests some improvements on the classical ASM to increase the performance of the mo… ▽ More

    Submitted 27 September, 2012; originally announced September 2012.

    Comments: 11 pages and 11 figures

    Journal ref: International Journal of Biometrics and Bioinformatics, 2011, Volume (4): Issue (6), pp. 224-234

  46. arXiv:1110.5404  [pdf

    cs.CV

    Face Recognition Based on SVM and 2DPCA

    Authors: Thai Hoang Le, Len Bui

    Abstract: The paper will present a novel approach for solving face recognition problem. Our method combines 2D Principal Component Analysis (2DPCA), one of the prominent methods for extracting feature vectors, and Support Vector Machine (SVM), the most powerful discriminative method for classification. Experiments based on proposed method have been conducted on two public data sets FERET and AT&T; the resul… ▽ More

    Submitted 24 October, 2011; originally announced October 2011.

    Comments: 10 pages, 7 figures, 2 tables, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 4, No. 3, September, 2011

  47. Efficient Interpolant Generation in Satisfiability Modulo Linear Integer Arithmetic

    Authors: Alberto Griggio, Thi Thieu Hoa Le, Roberto Sebastiani

    Abstract: The problem of computing Craig interpolants in SAT and SMT has recently received a lot of interest, mainly for its applications in formal verification. Efficient algorithms for interpolant generation have been presented for some theories of interest ---including that of equality and uninterpreted functions, linear arithmetic over the rationals, and their combination--- and they are successfully u… ▽ More

    Submitted 9 August, 2012; v1 submitted 21 October, 2010; originally announced October 2010.

    ACM Class: F.4.1

    Journal ref: Logical Methods in Computer Science, Volume 8, Issue 3 (August 10, 2012) lmcs:1033