Zum Hauptinhalt springen

Showing 1–50 of 100 results for author: Pham, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.11198  [pdf, other

    cs.SE cs.AI cs.NE

    EPiC: Cost-effective Search-based Prompt Engineering of LLMs for Code Generation

    Authors: Hamed Taherkhani, Melika Sepindband, Hung Viet Pham, Song Wang, Hadi Hemmati

    Abstract: Large Language Models (LLMs) have seen increasing use in various software development tasks, especially in code generation. The most advanced recent methods attempt to incorporate feedback from code execution into prompts to help guide LLMs in generating correct code, in an iterative process. While effective, these methods could be costly and time-consuming due to numerous interactions with the LL… ▽ More

    Submitted 20 August, 2024; originally announced August 2024.

    Comments: Submitted to TSE

  2. arXiv:2407.17181  [pdf, other

    eess.IV cs.CV

    Trans2Unet: Neural fusion for Nuclei Semantic Segmentation

    Authors: Dinh-Phu Tran, Quoc-Anh Nguyen, Van-Truong Pham, Thi-Thao Tran

    Abstract: Nuclei segmentation, despite its fundamental role in histopathological image analysis, is still a challenge work. The main challenge of this task is the existence of overlapping areas, which makes separating independent nuclei more complicated. In this paper, we propose a new two-branch architecture by combining the Unet and TransUnet networks for nuclei segmentation task. In the proposed architec… ▽ More

    Submitted 24 July, 2024; originally announced July 2024.

    Comments: ICCAIS 2022

  3. arXiv:2407.12241  [pdf, other

    cs.SE

    An Empirical Study of Static Analysis Tools for Secure Code Review

    Authors: Wachiraphan Charoenwet, Patanamon Thongtanunam, Van-Thuan Pham, Christoph Treude

    Abstract: Early identification of security issues in software development is vital to minimize their unanticipated impacts. Code review is a widely used manual analysis method that aims to uncover security issues along with other coding issues in software projects. While some studies suggest that automated static application security testing tools (SASTs) could enhance security issue identification, there i… ▽ More

    Submitted 16 July, 2024; originally announced July 2024.

    Comments: Accepted by ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) 2024

  4. arXiv:2407.00514  [pdf, ps, other

    cs.PL

    Combining Classical and Probabilistic Independence Reasoning to Verify the Security of Oblivious Algorithms (Extended Version)

    Authors: Pengbo Yan, Toby Murray, Olga Ohrimenko, Van-Thuan Pham, Robert Sison

    Abstract: We consider the problem of how to verify the security of probabilistic oblivious algorithms formally and systematically. Unfortunately, prior program logics fail to support a number of complexities that feature in the semantics and invariant needed to verify the security of many practical probabilistic oblivious algorithms. We propose an approach based on reasoning over perfectly oblivious approxi… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  5. arXiv:2406.17272  [pdf, ps, other

    cs.LG

    A Comprehensive Solution to Connect Speech Encoder and Large Language Model for ASR

    Authors: Van Tung Pham, Yist Lin, Tao Han, Wei Li, Jun Zhang, Lu Lu, Yuxuan Wang

    Abstract: Recent works have shown promising results in connecting speech encoders to large language models (LLMs) for speech recognition. However, several limitations persist, including limited fine-tuning options, a lack of mechanisms to enforce speech-text alignment, and high insertion errors especially in domain mismatch conditions. This paper presents a comprehensive solution to address these issues. We… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

  6. arXiv:2405.15779  [pdf

    eess.IV cs.AI cs.CV

    LiteNeXt: A Novel Lightweight ConvMixer-based Model with Self-embedding Representation Parallel for Medical Image Segmentation

    Authors: Ngoc-Du Tran, Thi-Thao Tran, Quang-Huy Nguyen, Manh-Hung Vu, Van-Truong Pham

    Abstract: The emergence of deep learning techniques has advanced the image segmentation task, especially for medical images. Many neural network models have been introduced in the last decade bringing the automated segmentation accuracy close to manual segmentation. However, cutting-edge models like Transformer-based architectures rely on large scale annotated training data, and are generally designed with… ▽ More

    Submitted 3 April, 2024; originally announced May 2024.

    Comments: 35 pages, 9 figures, 10 tables

  7. arXiv:2405.12252  [pdf, ps, other

    cs.DS cs.AI

    Enhanced Deterministic Approximation Algorithm for Non-monotone Submodular Maximization under Knapsack Constraint with Linear Query Complexity

    Authors: Canh V. Pham

    Abstract: In this work, we consider the Submodular Maximization under Knapsack (SMK) constraint problem over the ground set of size $n$. The problem recently attracted a lot of attention due to its applications in various domains of combination optimization, artificial intelligence, and machine learning. We improve the approximation factor of the fastest deterministic algorithm from $6+ε$ to $5+ε$ while kee… ▽ More

    Submitted 19 May, 2024; originally announced May 2024.

  8. arXiv:2405.06870  [pdf, other

    cs.IT

    Noise-Tolerant Codebooks for Semi-Quantitative Group Testing: Application to Spatial Genomics

    Authors: Kok Hao Chen, Duc Tu Dao, Han Mao Kiah, Van Long Phuoc Pham, Eitan Yaakobi

    Abstract: Motivated by applications in spatial genomics, we revisit group testing (Dorfman~1943) and propose the class of $λ$-{\sf ADD}-codes, studying such codes with certain distance $d$ and codelength $n$. When $d$ is constant, we provide explicit code constructions with rates close to $1/2$. When $d$ is proportional to $n$, we provide a GV-type lower bound whose rates are efficiently computable. Upper b… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: To appear in ISIT 2024 Proceedings

  9. arXiv:2405.03011  [pdf

    cs.CV cs.AI

    AC-MAMBASEG: An adaptive convolution and Mamba-based architecture for enhanced skin lesion segmentation

    Authors: Viet-Thanh Nguyen, Van-Truong Pham, Thi-Thao Tran

    Abstract: Skin lesion segmentation is a critical task in computer-aided diagnosis systems for dermatological diseases. Accurate segmentation of skin lesions from medical images is essential for early detection, diagnosis, and treatment planning. In this paper, we propose a new model for skin lesion segmentation namely AC-MambaSeg, an enhanced model that has the hybrid CNN-Mamba backbone, and integrates adva… ▽ More

    Submitted 5 May, 2024; originally announced May 2024.

    Comments: 15 pages, 7 figures, 4 tables

  10. arXiv:2404.09621  [pdf, other

    eess.SY cs.ET cs.HC cs.RO

    AAM-VDT: Vehicle Digital Twin for Tele-Operations in Advanced Air Mobility

    Authors: Tuan Anh Nguyen, Taeho Kwag, Vinh Pham, Viet Nghia Nguyen, Jeongseok Hyun, Minseok Jang, Jae-Woo Lee

    Abstract: This study advanced tele-operations in Advanced Air Mobility (AAM) through the creation of a Vehicle Digital Twin (VDT) system for eVTOL aircraft, tailored to enhance remote control safety and efficiency, especially for Beyond Visual Line of Sight (BVLOS) operations. By synergizing digital twin technology with immersive Virtual Reality (VR) interfaces, we notably elevate situational awareness and… ▽ More

    Submitted 15 April, 2024; originally announced April 2024.

  11. arXiv:2404.07396  [pdf, other

    econ.GN cs.AI

    Can Base ChatGPT be Used for Forecasting without Additional Optimization?

    Authors: Van Pham, Scott Cunningham

    Abstract: This study investigates whether OpenAI's ChatGPT-3.5 and ChatGPT-4 can forecast future events. To evaluate the accuracy of the predictions, we take advantage of the fact that the training data at the time of our experiments (mid 2023) stopped at September 2021, and ask about events that happened in 2022. We employed two prompting strategies: direct prediction and what we call future narratives whi… ▽ More

    Submitted 4 July, 2024; v1 submitted 10 April, 2024; originally announced April 2024.

    Comments: 77 pages, added falsification exercises in section `Post Scriptum:...' with new figures; new title 61 pages, 26 figures; corrected typos

  12. arXiv:2403.07763  [pdf, other

    cs.NI cs.ET

    Emerging Technologies for 6G Non-Terrestrial-Networks: From Academia to Industrial Applications

    Authors: Cong T. Nguyen, Yuris Mulya Saputra, Nguyen Van Huynh, Tan N. Nguyen, Dinh Thai Hoang, Diep N Nguyen, Van-Quan Pham, Miroslav Voznak, Symeon Chatzinotas, Dinh-Hieu Tran

    Abstract: Terrestrial networks form the fundamental infrastructure of modern communication systems, serving more than 4 billion users globally. However, terrestrial networks are facing a wide range of challenges, from coverage and reliability to interference and congestion. As the demands of the 6G era are expected to be much higher, it is crucial to address these challenges to ensure a robust and efficient… ▽ More

    Submitted 3 July, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: 35 pages

  13. arXiv:2403.04918  [pdf, other

    cs.CR

    Secure Information Embedding and Extraction in Forensic 3D Fingerprinting

    Authors: Canran Wang, Jinwen Wang, Mi Zhou, Vinh Pham, Senyue Hao, Chao Zhou, Ning Zhang, Netanel Raviv

    Abstract: The prevalence of 3D printing poses a significant risk to public safety, as any individual with internet access and a commodity printer is able to produce untraceable firearms, keys, counterfeit products, etc. To aid government authorities in combating these new security threats, several approaches have been taken to tag 3D-prints with identifying information. Known as fingerprints, this informati… ▽ More

    Submitted 12 June, 2024; v1 submitted 7 March, 2024; originally announced March 2024.

  14. arXiv:2402.13554  [pdf, ps, other

    cs.IT eess.SP

    Secrecy Performance Analysis of Space-to-Ground Optical Satellite Communications

    Authors: Thang V. Nguyen, Thanh V. Pham, Anh T. Pham, Dang T. Ngoc

    Abstract: Free-space optics (FSO)-based satellite communication systems have recently received considerable attention due to their enhanced capacity compared to their radio frequency (RF) counterparts. This paper analyzes the performance of physical layer security of space-to-ground intensity modulation/direct detection FSO satellite links under the effect of atmospheric loss, misalignment, cloud attenuatio… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  15. arXiv:2402.13549  [pdf, ps, other

    cs.IT eess.SY

    Q-learning-based Joint Design of Adaptive Modulation and Precoding for Physical Layer Security in Visible Light Communications

    Authors: Duc M. T. Hoang, Thanh V. Pham, Anh T. Pham, Chuyen T Nguyen

    Abstract: There has been an increasing interest in physical layer security (PLS), which, compared with conventional cryptography, offers a unique approach to guaranteeing information confidentiality against eavesdroppers. In this paper, we study a joint design of adaptive $M$-ary pulse amplitude modulation (PAM) and precoding, which aims to optimize wiretap visible-light channels' secrecy capacity and bit e… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

  16. arXiv:2402.11702  [pdf, other

    cs.SE cs.AI cs.LG

    Can ChatGPT Support Developers? An Empirical Evaluation of Large Language Models for Code Generation

    Authors: Kailun Jin, Chung-Yu Wang, Hung Viet Pham, Hadi Hemmati

    Abstract: Large language models (LLMs) have demonstrated notable proficiency in code generation, with numerous prior studies showing their promising capabilities in various development scenarios. However, these studies mainly provide evaluations in research settings, which leaves a significant gap in understanding how effectively LLMs can support developers in real-world. To address this, we conducted an em… ▽ More

    Submitted 16 March, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

    Comments: 4 pages, 3 figures, 21st International Conference on Mining Software Repositories (MSR '24), April 15-16, 2024, Lisbon, Portugal

    ACM Class: I.2.2

  17. arXiv:2312.09422  [pdf, other

    eess.SP cs.LG math.FA stat.ME

    Joint Alignment of Multivariate Quasi-Periodic Functional Data Using Deep Learning

    Authors: Vi Thanh Pham, Jonas Bille Nielsen, Klaus Fuglsang Kofoed, Jørgen Tobias Kühl, Andreas Kryger Jensen

    Abstract: The joint alignment of multivariate functional data plays an important role in various fields such as signal processing, neuroscience and medicine, including the statistical analysis of data from wearable devices. Traditional methods often ignore the phase variability and instead focus on the variability in the observed amplitude. We present a novel method for joint alignment of multivariate quasi… ▽ More

    Submitted 14 November, 2023; originally announced December 2023.

    Comments: 28 pages, 6 figures

  18. arXiv:2312.08700  [pdf, other

    cs.LG cs.CV

    RdimKD: Generic Distillation Paradigm by Dimensionality Reduction

    Authors: Yi Guo, Yiqian He, Xiaoyang Li, Haotong Qin, Van Tung Pham, Yang Zhang, Shouda Liu

    Abstract: Knowledge Distillation (KD) emerges as one of the most promising compression technologies to run advanced deep neural networks on resource-limited devices. In order to train a small network (student) under the guidance of a large network (teacher), the intuitive method is regularizing the feature maps or logits of the student using the teacher's information. However, existing methods either over-r… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: particularly favored in industry

  19. arXiv:2311.16396  [pdf, other

    cs.SE

    Toward Effective Secure Code Reviews: An Empirical Study of Security-Related Coding Weaknesses

    Authors: Wachiraphan Charoenwet, Patanamon Thongtanunam, Van-Thuan Pham, Christoph Treude

    Abstract: Identifying security issues early is encouraged to reduce the latent negative impacts on software systems. Code review is a widely-used method that allows developers to manually inspect modified code, catching security issues during a software development cycle. However, existing code review studies often focus on known vulnerabilities, neglecting coding weaknesses, which can introduce real-world… ▽ More

    Submitted 8 May, 2024; v1 submitted 27 November, 2023; originally announced November 2023.

  20. arXiv:2310.18532  [pdf, other

    cs.SE

    SkipAnalyzer: A Tool for Static Code Analysis with Large Language Models

    Authors: Mohammad Mahdi Mohajer, Reem Aleithan, Nima Shiri Harzevili, Moshi Wei, Alvine Boaye Belle, Hung Viet Pham, Song Wang

    Abstract: We introduce SkipAnalyzer, a large language model (LLM)-powered tool for static code analysis. SkipAnalyzer has three components: 1) an LLM-based static bug detector that scans source code and reports specific types of bugs, 2) an LLM-based false-positive filter that can identify false-positive bugs in the results of static bug detectors (e.g., the result of step 1) to improve detection accuracy,… ▽ More

    Submitted 17 December, 2023; v1 submitted 27 October, 2023; originally announced October 2023.

  21. arXiv:2310.06912  [pdf, other

    cs.SE

    Benchmarking Deep Learning Fuzzers

    Authors: Nima Shiri Harzevili, Hung Viet Pham, Song Wang

    Abstract: In this work, we set out to conduct the first ground-truth empirical evaluation of state-of-the-art DL fuzzers. Specifically, we first manually created an extensive DL bug benchmark dataset, which includes 627 real-world DL bugs from TensorFlow and PyTorch libraries reported by users between 2020 and 2022. Then we run three state-of-the-art DL fuzzers, i.e., FreeFuzz, DeepRel, and DocTer, on the b… ▽ More

    Submitted 10 October, 2023; originally announced October 2023.

  22. arXiv:2309.15518  [pdf, other

    cs.CR cs.AI

    Raijū: Reinforcement Learning-Guided Post-Exploitation for Automating Security Assessment of Network Systems

    Authors: Van-Hau Pham, Hien Do Hoang, Phan Thanh Trung, Van Dinh Quoc, Trong-Nghia To, Phan The Duy

    Abstract: In order to assess the risks of a network system, it is important to investigate the behaviors of attackers after successful exploitation, which is called post-exploitation. Although there are various efficient tools supporting post-exploitation implementation, no application can automate this process. Most of the steps of this process are completed by experts who have profound knowledge of securi… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  23. arXiv:2309.15483  [pdf, ps, other

    cs.IT eess.SY

    Energy-Efficient Precoding Designs for Multi-User Visible Light Communication Systems with Confidential Messages

    Authors: Son T. Duong, Thanh V. Pham, Chuyen T. Nguyen, Anh T. Pham

    Abstract: This paper studies energy-efficient precoding designs for multi-user visible light communication (VLC) systems from the perspective of physical layer security where users' messages must be kept mutually confidential. For such systems, we first derive a lower bound on the achievable secrecy rate of each user. Next, the total power consumption for illumination and data transmission is thoroughly ana… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

  24. arXiv:2309.14677  [pdf, other

    cs.CR cs.AI

    XGV-BERT: Leveraging Contextualized Language Model and Graph Neural Network for Efficient Software Vulnerability Detection

    Authors: Vu Le Anh Quan, Chau Thuan Phat, Kiet Van Nguyen, Phan The Duy, Van-Hau Pham

    Abstract: With the advancement of deep learning (DL) in various fields, there are many attempts to reveal software vulnerabilities by data-driven approach. Nonetheless, such existing works lack the effective representation that can retain the non-sequential semantic characteristics and contextual relationship of source code attributes. Hence, in this work, we propose XGV-BERT, a framework that combines the… ▽ More

    Submitted 26 September, 2023; originally announced September 2023.

  25. arXiv:2309.14636  [pdf, ps, other

    cs.IT eess.SY

    Design of Energy-Efficient Artificial Noise for Physical Layer Security in Visible Light Communications

    Authors: Thanh V. Pham, Anh T. Pham, Susumu Ishihara

    Abstract: This paper studies the design of energy-efficient artificial noise (AN) schemes in the context of physical layer security in visible light communications (VLC). Two different transmission schemes termed $\textit{selective AN-aided single-input single-output (SISO)}$ and $\textit{AN-aided multiple-input single-output (MISO)}$ are examined and compared in terms of secrecy energy efficiency (SEE). In… ▽ More

    Submitted 25 September, 2023; originally announced September 2023.

  26. arXiv:2309.13841  [pdf, other

    cs.CR cs.LG

    On the Effectiveness of Adversarial Samples against Ensemble Learning-based Windows PE Malware Detectors

    Authors: Trong-Nghia To, Danh Le Kim, Do Thi Thu Hien, Nghi Hoang Khoa, Hien Do Hoang, Phan The Duy, Van-Hau Pham

    Abstract: Recently, there has been a growing focus and interest in applying machine learning (ML) to the field of cybersecurity, particularly in malware detection and prevention. Several research works on malware analysis have been proposed, offering promising results for both academic and practical applications. In these works, the use of Generative Adversarial Networks (GANs) or Reinforcement Learning (RL… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

  27. arXiv:2309.12025  [pdf, other

    cs.DS cs.CC cs.LG math.CO

    Robust Approximation Algorithms for Non-monotone $k$-Submodular Maximization under a Knapsack Constraint

    Authors: Dung T. K. Ha, Canh V. Pham, Tan D. Tran, Huan X. Hoang

    Abstract: The problem of non-monotone $k$-submodular maximization under a knapsack constraint ($\kSMK$) over the ground set size $n$ has been raised in many applications in machine learning, such as data summarization, information propagation, etc. However, existing algorithms for the problem are facing questioning of how to overcome the non-monotone case and how to fast return a good solution in case of th… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: 12 pages

    Report number: KSE-ID38

  28. arXiv:2309.11053  [pdf, other

    cs.CR

    Fed-LSAE: Thwarting Poisoning Attacks against Federated Cyber Threat Detection System via Autoencoder-based Latent Space Inspection

    Authors: Tran Duc Luong, Vuong Minh Tien, Nguyen Huu Quyen, Do Thi Thu Hien, Phan The Duy, Van-Hau Pham

    Abstract: The significant rise of security concerns in conventional centralized learning has promoted federated learning (FL) adoption in building intelligent applications without privacy breaches. In cybersecurity, the sensitive data along with the contextual information and high-quality labeling in each enterprise organization play an essential role in constructing high-performance machine learning (ML) m… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  29. arXiv:2309.08485  [pdf, other

    cs.CR cs.AI

    XFedHunter: An Explainable Federated Learning Framework for Advanced Persistent Threat Detection in SDN

    Authors: Huynh Thai Thi, Ngo Duc Hoang Son, Phan The Duy, Nghi Hoang Khoa, Khoa Ngo-Khanh, Van-Hau Pham

    Abstract: Advanced Persistent Threat (APT) attacks are highly sophisticated and employ a multitude of advanced methods and techniques to target organizations and steal sensitive and confidential information. APT attacks consist of multiple stages and have a defined strategy, utilizing new and innovative techniques and technologies developed by hackers to evade security software monitoring. To effectively pr… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  30. arXiv:2309.08474  [pdf, other

    cs.CR cs.AI

    VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model

    Authors: Phan The Duy, Nghi Hoang Khoa, Nguyen Huu Quyen, Le Cong Trinh, Vu Trung Kien, Trinh Minh Hoang, Van-Hau Pham

    Abstract: This paper presents VulnSense framework, a comprehensive approach to efficiently detect vulnerabilities in Ethereum smart contracts using a multimodal learning approach on graph-based and natural language processing (NLP) models. Our proposed framework combines three types of features from smart contracts comprising source code, opcode sequences, and control flow graph (CFG) extracted from bytecod… ▽ More

    Submitted 15 September, 2023; originally announced September 2023.

  31. arXiv:2308.02677  [pdf

    cs.CY

    Metaverse for Industry 5.0 in NextG Communications: Potential Applications and Future Challenges

    Authors: B. Prabadevi, N. Deepa, Nancy Victor, Thippa Reddy Gadekallu, Praveen Kumar Reddy Maddikunta, Gokul Yenduri, Wei Wang, Quoc Viet Pham, Thien Huynh-The, Madhusanka Liyanage

    Abstract: With the advent of new technologies and endeavors for automation in almost all day-to-day activities, the recent discussions on the metaverse life have a greater expectation. Furthermore, we are in the era of the fifth industrial revolution, where machines and humans collaborate to maximize productivity with the effective utilization of human intelligence and other resources. Hence, Industry 5.0 i… ▽ More

    Submitted 31 July, 2023; originally announced August 2023.

    Comments: Submitted for peer review

  32. arXiv:2307.16834  [pdf

    cs.CV cs.AI cs.LG eess.IV

    Benchmarking Jetson Edge Devices with an End-to-end Video-based Anomaly Detection System

    Authors: Hoang Viet Pham, Thinh Gia Tran, Chuong Dinh Le, An Dinh Le, Hien Bich Vo

    Abstract: Innovative enhancement in embedded system platforms, specifically hardware accelerations, significantly influence the application of deep learning in real-world scenarios. These innovations translate human labor efforts into automated intelligent systems employed in various areas such as autonomous driving, robotics, Internet-of-Things (IoT), and numerous other impactful applications. NVIDIA's Jet… ▽ More

    Submitted 12 September, 2023; v1 submitted 28 July, 2023; originally announced July 2023.

    Comments: Accepted in Future of Information and Communication Conference (FICC) 2024

  33. arXiv:2307.02819  [pdf, other

    cs.HC cs.LG

    Trends in Machine Learning and Electroencephalogram (EEG): A Review for Undergraduate Researchers

    Authors: Nathan Koome Murungi, Michael Vinh Pham, Xufeng Dai, Xiaodong Qu

    Abstract: This paper presents a systematic literature review on Brain-Computer Interfaces (BCIs) in the context of Machine Learning. Our focus is on Electroencephalography (EEG) research, highlighting the latest trends as of 2023. The objective is to provide undergraduate researchers with an accessible overview of the BCI field, covering tasks, algorithms, and datasets. By synthesizing recent findings, our… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

    Comments: 14 pages, 1 figure, HCI International 2023 Conference

  34. arXiv:2306.17379  [pdf, other

    cs.RO cs.HC

    What Could a Social Mediator Robot Do? Lessons from Real-World Mediation Scenarios

    Authors: Thomas H. Weisswange, Hifza Javed, Manuel Dietrich, Tuan Vu Pham, Maria Teresa Parreira, Michael Sack, Nawid Jamali

    Abstract: The use of social robots as instruments for social mediation has been gaining traction in the field of Human-Robot Interaction (HRI). So far, the design of such robots and their behaviors is often driven by technological platforms and experimental setups in controlled laboratory environments. To address complex social relationships in the real world, it is crucial to consider the actual needs and… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

  35. arXiv:2306.16103  [pdf

    eess.IV cs.CV

    1M parameters are enough? A lightweight CNN-based model for medical image segmentation

    Authors: Binh-Duong Dinh, Thanh-Thu Nguyen, Thi-Thao Tran, Van-Truong Pham

    Abstract: Convolutional neural networks (CNNs) and Transformer-based models are being widely applied in medical image segmentation thanks to their ability to extract high-level features and capture important aspects of the image. However, there is often a trade-off between the need for high accuracy and the desire for low computational cost. A model with higher parameters can theoretically achieve better pe… ▽ More

    Submitted 3 July, 2023; v1 submitted 28 June, 2023; originally announced June 2023.

    Comments: I have fixed Figure 1

  36. arXiv:2306.03269  [pdf, other

    cs.CR cs.SE

    Security Knowledge-Guided Fuzzing of Deep Learning Libraries

    Authors: Nima Shiri Harzevili, Mohammad Mahdi Mohajer, Moshi Wei, Hung Viet Pham, Song Wang

    Abstract: Recently, many Deep Learning fuzzers have been proposed for testing of DL libraries. However, they either perform unguided input generation (e.g., not considering the relationship between API arguments when generating inputs) or only support a limited set of corner case test inputs. Furthermore, a substantial number of developer APIs crucial for library development remain untested, as they are typ… ▽ More

    Submitted 24 December, 2023; v1 submitted 5 June, 2023; originally announced June 2023.

  37. arXiv:2305.18607  [pdf, other

    cs.SE cs.AI cs.CR

    How Effective Are Neural Networks for Fixing Security Vulnerabilities

    Authors: Yi Wu, Nan Jiang, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan, Petr Babkin, Sameena Shah

    Abstract: Security vulnerability repair is a difficult task that is in dire need of automation. Two groups of techniques have shown promise: (1) large code language models (LLMs) that have been pre-trained on source code for tasks such as code completion, and (2) automated program repair (APR) techniques that use deep learning (DL) models to automatically fix software bugs. This paper is the first to stud… ▽ More

    Submitted 1 April, 2024; v1 submitted 29 May, 2023; originally announced May 2023.

    Comments: This paper was accepted in the proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2023), and was presented at the conference, that was held in Seattle, USA, 17-21 July 2023

  38. arXiv:2305.10292  [pdf, other

    cs.DS cs.AI

    Linear Query Approximation Algorithms for Non-monotone Submodular Maximization under Knapsack Constraint

    Authors: Canh V. Pham, Tan D. Tran, Dung T. K. Ha, My T. Thai

    Abstract: This work, for the first time, introduces two constant factor approximation algorithms with linear query complexity for non-monotone submodular maximization over a ground set of size $n$ subject to a knapsack constraint, $\mathsf{DLA}$ and $\mathsf{RLA}$. $\mathsf{DLA}$ is a deterministic algorithm that provides an approximation factor of $6+ε$ while $\mathsf{RLA}$ is a randomized algorithm with a… ▽ More

    Submitted 10 July, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

  39. arXiv:2305.07274  [pdf, other

    cs.IT

    Deletion Correcting Codes for Efficient DNA Synthesis

    Authors: Johan Chrisnata, Han Mao Kiah, Van Long Phuoc Pham

    Abstract: The synthesis of DNA strands remains the most costly part of the DNA storage system. Thus, to make DNA storage system more practical, the time and materials used in the synthesis process have to be optimized. We consider the most common type of synthesis process where multiple DNA strands are synthesized in parallel from a common alternating supersequence, one nucleotide at a time. The synthesis t… ▽ More

    Submitted 12 May, 2023; originally announced May 2023.

    Comments: A shorter version of this paper will be presented in in ISIT 2023

  40. arXiv:2304.12560  [pdf

    cs.NI

    HexRAN: A Programmable Approach to Open RAN Base Station System Design

    Authors: Ahan Kak, Van-Quan Pham, Huu-Trung Thieu, Nakjung Choi

    Abstract: In recent years, the radio access network (RAN) domain has witnessed a sea change with increasing levels of virtualization and softwarization driven by emerging paradigms such as the Open RAN (O-RAN) movement. However, the fundamental building block of the cellular network, i.e., the base station, remains unchanged and ill-equipped to handle this architectural evolution. In particular, with refere… ▽ More

    Submitted 3 July, 2024; v1 submitted 25 April, 2023; originally announced April 2023.

  41. arXiv:2304.08252  [pdf, other

    cs.RO

    PaaS: Planning as a Service for reactive driving in CARLA Leaderboard

    Authors: Nhat Hao Truong, Huu Thien Mai, Tuan Anh Tran, Minh Quang Tran, Duc Duy Nguyen, Ngoc Viet Phuong Pham

    Abstract: End-to-end deep learning approaches has been proven to be efficient in autonomous driving and robotics. By using deep learning techniques for decision-making, those systems are often referred to as a black box, and the result is driven by data. In this paper, we propose PaaS (Planning as a Service), a vanilla module to generate local trajectory planning for autonomous driving in CARLA simulation.… ▽ More

    Submitted 14 June, 2023; v1 submitted 17 April, 2023; originally announced April 2023.

    Comments: accepted on 05.06.2023, revised on 15.06.2023, to be published on ICSSE 2023

  42. arXiv:2304.00557  [pdf, other

    cs.CL cs.LG

    Semi-supervised Neural Machine Translation with Consistency Regularization for Low-Resource Languages

    Authors: Viet H. Pham, Thang M. Pham, Giang Nguyen, Long Nguyen, Dien Dinh

    Abstract: The advent of deep learning has led to a significant gain in machine translation. However, most of the studies required a large parallel dataset which is scarce and expensive to construct and even unavailable for some languages. This paper presents a simple yet effective method to tackle this problem for low-resource languages by augmenting high-quality sentence pairs and training NMT models in a… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: TMP and GN contributed equally

  43. arXiv:2302.11252  [pdf, other

    cs.CV

    Focusing On Targets For Improving Weakly Supervised Visual Grounding

    Authors: Viet-Quoc Pham, Nao Mishima

    Abstract: Weakly supervised visual grounding aims to predict the region in an image that corresponds to a specific linguistic query, where the mapping between the target object and query is unknown in the training stage. The state-of-the-art method uses a vision language pre-training model to acquire heatmaps from Grad-CAM, which matches every query word with an image region, and uses the combined heatmap t… ▽ More

    Submitted 22 February, 2023; originally announced February 2023.

    Comments: accepted by ICASSP2023

  44. arXiv:2302.11125  [pdf, ps, other

    cs.IT eess.SY

    On the Design of Artificial Noise for Physical Layer Security in Visible Light Communication Channels with Clipping

    Authors: Thanh V. Pham, Steve Hranilovic, Susumu Ishihara

    Abstract: Though visible light communication (VLC) systems are contained to a given room, improving their security is an important criterion in any practical deployment. In this paper, the design of artificial noise (AN) to enhance physical layer security in VLC systems is studied in the context of input signals with no explicit amplitude constraint (e.g., multicarrier systems). In such systems, clipping is… ▽ More

    Submitted 21 February, 2023; originally announced February 2023.

    Comments: arXiv admin note: text overlap with arXiv:2210.00438

  45. arXiv:2301.11252  [pdf

    cs.IR

    Ontology-based Solution for Building an Intelligent Searching System on Traffic Law Documents

    Authors: Vuong T. Pham, Hien D. Nguyen, Thinh Le, Binh Nguyen, Quoc Hung Ngo

    Abstract: In this paper, an ontology-based approach is used to organize the knowledge base of legal documents in road traffic law. This knowledge model is built by the improvement of ontology Rela-model. In addition, several searching problems on traffic law are proposed and solved based on the legal knowledge base. The intelligent search system on Vietnam road traffic law is constructed by applying the met… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

  46. EDEFuzz: A Web API Fuzzer for Excessive Data Exposures

    Authors: Lianglu Pan, Shaanan Cohney, Toby Murray, Van-Thuan Pham

    Abstract: APIs often transmit far more data to client applications than they need, and in the context of web applications, often do so over public channels. This issue, termed Excessive Data Exposure (EDE), was OWASP's third most significant API vulnerability of 2019. However, there are few automated tools -- either in research or industry -- to effectively find and remediate such issues. This is unsurprisi… ▽ More

    Submitted 27 May, 2024; v1 submitted 22 January, 2023; originally announced January 2023.

  47. arXiv:2212.14353  [pdf, other

    cs.DC eess.SP

    Sheaf-theoretic self-filtering network of low-cost sensors for local air quality monitoring: A causal approach

    Authors: Anh-Duy Pham, Chuong Dinh Le, Hoang Viet Pham, Thinh Gia Tran, Dat Thanh Vo, Chau Long Tran, An Dinh Le, Hien Bich Vo

    Abstract: Sheaf theory, which is a complex but powerful tool supported by topological theory, offers more flexibility and precision than traditional graph theory when it comes to modeling relationships between multiple features. In the realm of air quality monitoring, this can be incredibly useful in detecting sudden changes in local dust particle density, which can be difficult to accurately measure using… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

  48. arXiv:2212.01761  [pdf

    physics.soc-ph cs.CV

    A PM2.5 concentration prediction framework with vehicle tracking system: From cause to effect

    Authors: Chuong D. Le, Hoang V. Pham, Duy A. Pham, An D. Le, Hien B. Vo

    Abstract: Air pollution is an emerging problem that needs to be solved especially in developed and developing countries. In Vietnam, air pollution is also a concerning issue in big cities such as Hanoi and Ho Chi Minh cities where air pollution comes mostly from vehicles such as cars and motorbikes. In order to tackle the problem, the paper focuses on developing a solution that can estimate the emitted PM2.… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

  49. arXiv:2211.00091  [pdf, other

    cs.CV

    Road Damages Detection and Classification with YOLOv7

    Authors: Vung Pham, Du Nguyen, Christopher Donan

    Abstract: Maintaining the roadway infrastructure is one of the essential factors in enabling a safe, economic, and sustainable transportation system. Manual roadway damage data collection is laborious and unsafe for humans to perform. This area is poised to benefit from the rapid advance and diffusion of artificial intelligence technologies. Specifically, deep learning advancements enable the detection of r… ▽ More

    Submitted 31 October, 2022; originally announced November 2022.

    Comments: 8 pages, 5 tables, 9 figures, 17 references

  50. arXiv:2210.15876  [pdf, ps, other

    eess.AS cs.CL cs.SD

    Random Utterance Concatenation Based Data Augmentation for Improving Short-video Speech Recognition

    Authors: Yist Y. Lin, Tao Han, Haihua Xu, Van Tung Pham, Yerbolat Khassanov, Tze Yuang Chong, Yi He, Lu Lu, Zejun Ma

    Abstract: One of limitations in end-to-end automatic speech recognition (ASR) framework is its performance would be compromised if train-test utterance lengths are mismatched. In this paper, we propose an on-the-fly random utterance concatenation (RUC) based data augmentation method to alleviate train-test utterance length mismatch issue for short-video ASR task. Specifically, we are motivated by observatio… ▽ More

    Submitted 25 May, 2023; v1 submitted 27 October, 2022; originally announced October 2022.

    Comments: 5 pages, 3 figures, 4 tables