-
Color Centers in Hexagonal Boron Nitride
Authors:
Suk Hyun Kim,
Kyeong Ho Park,
Young Gie Lee,
Seong Jun Kang,
Yongsup Park,
Young Duck Kim
Abstract:
Atomically thin two-dimensional (2D) hexagonal boron nitride (hBN) has emerged as an essential material for the encapsulation layer in van der Waals heterostructures and efficient deep ultra-violet optoelectronics. This is primarily due to its remarkable physical properties and ultrawide bandgap (close to 6 eV, and even larger in some cases) properties. Color centers in hBN refer to intrinsic vaca…
▽ More
Atomically thin two-dimensional (2D) hexagonal boron nitride (hBN) has emerged as an essential material for the encapsulation layer in van der Waals heterostructures and efficient deep ultra-violet optoelectronics. This is primarily due to its remarkable physical properties and ultrawide bandgap (close to 6 eV, and even larger in some cases) properties. Color centers in hBN refer to intrinsic vacancies and extrinsic impurities within the 2D crystal lattice, which result in distinct optical properties in the ultraviolet (UV) to near-infrared (IR) range. Furthermore, each color center in hBN exhibits a unique emission spectrum and possesses various spin properties. These characteristics open up possibilities for the development of next-generation optoelectronics and quantum information applications, including room-temperature single-photon sources and quantum sensors. Here, we provide a comprehensive overview of the atomic configuration, optical and quantum properties, and different techniques employed for the formation of color centers in hBN. A deep understanding of color centers in hBN allows for advances in the development of next-generation UV optoelectronic applications, solid-state quantum technologies, and nanophotonics by harnessing the exceptional capabilities offered by hBN color centers.
△ Less
Submitted 12 September, 2024;
originally announced September 2024.
-
PULL: PU-Learning-based Accurate Link Prediction
Authors:
Junghun Kim,
Ka Hyun Park,
Hoyoung Yoon,
U Kang
Abstract:
Given an edge-incomplete graph, how can we accurately find the missing links? The link prediction in edge-incomplete graphs aims to discover the missing relations between entities when their relationships are represented as a graph. Edge-incomplete graphs are prevalent in real-world due to practical limitations, such as not checking all users when adding friends in a social network. Addressing the…
▽ More
Given an edge-incomplete graph, how can we accurately find the missing links? The link prediction in edge-incomplete graphs aims to discover the missing relations between entities when their relationships are represented as a graph. Edge-incomplete graphs are prevalent in real-world due to practical limitations, such as not checking all users when adding friends in a social network. Addressing the problem is crucial for various tasks, including recommending friends in social networks and finding references in citation networks. However, previous approaches rely heavily on the given edge-incomplete (observed) graph, making it challenging to consider the missing (unobserved) links during training. In this paper, we propose PULL (PU-Learning-based Link predictor), an accurate link prediction method based on the positive-unlabeled (PU) learning. PULL treats the observed edges in the training graph as positive examples, and the unconnected node pairs as unlabeled ones. PULL effectively prevents the link predictor from overfitting to the observed graph by proposing latent variables for every edge, and leveraging the expected graph structure with respect to the variables. Extensive experiments on five real-world datasets show that PULL consistently outperforms the baselines for predicting links in edge-incomplete graphs.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Learning Decomposable and Debiased Representations via Attribute-Centric Information Bottlenecks
Authors:
Jinyung Hong,
Eun Som Jeon,
Changhoon Kim,
Keun Hee Park,
Utkarsh Nath,
Yezhou Yang,
Pavan Turaga,
Theodore P. Pavlic
Abstract:
Biased attributes, spuriously correlated with target labels in a dataset, can problematically lead to neural networks that learn improper shortcuts for classifications and limit their capabilities for out-of-distribution (OOD) generalization. Although many debiasing approaches have been proposed to ensure correct predictions from biased datasets, few studies have considered learning latent embeddi…
▽ More
Biased attributes, spuriously correlated with target labels in a dataset, can problematically lead to neural networks that learn improper shortcuts for classifications and limit their capabilities for out-of-distribution (OOD) generalization. Although many debiasing approaches have been proposed to ensure correct predictions from biased datasets, few studies have considered learning latent embedding consisting of intrinsic and biased attributes that contribute to improved performance and explain how the model pays attention to attributes. In this paper, we propose a novel debiasing framework, Debiasing Global Workspace, introducing attention-based information bottlenecks for learning compositional representations of attributes without defining specific bias types. Based on our observation that learning shape-centric representation helps robust performance on OOD datasets, we adopt those abilities to learn robust and generalizable representations of decomposable latent embeddings corresponding to intrinsic and biasing attributes. We conduct comprehensive evaluations on biased datasets, along with both quantitative and qualitative analyses, to showcase our approach's efficacy in attribute-centric representation learning and its ability to differentiate between intrinsic and bias-related features.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
Interpreting Answers to Yes-No Questions in User-Generated Content
Authors:
Shivam Mathur,
Keun Hee Park,
Dhivya Chinnappa,
Saketh Kotamraju,
Eduardo Blanco
Abstract:
Interpreting answers to yes-no questions in social media is difficult. Yes and no keywords are uncommon, and the few answers that include them are rarely to be interpreted what the keywords suggest. In this paper, we present a new corpus of 4,442 yes-no question-answer pairs from Twitter. We discuss linguistic characteristics of answers whose interpretation is yes or no, as well as answers whose i…
▽ More
Interpreting answers to yes-no questions in social media is difficult. Yes and no keywords are uncommon, and the few answers that include them are rarely to be interpreted what the keywords suggest. In this paper, we present a new corpus of 4,442 yes-no question-answer pairs from Twitter. We discuss linguistic characteristics of answers whose interpretation is yes or no, as well as answers whose interpretation is unknown. We show that large language models are far from solving this problem, even after fine-tuning and blending other corpora for the same problem but outside social media.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Interpreting Indirect Answers to Yes-No Questions in Multiple Languages
Authors:
Zijie Wang,
Md Mosharaf Hossain,
Shivam Mathur,
Terry Cruz Melo,
Kadir Bulut Ozler,
Keun Hee Park,
Jacob Quintero,
MohammadHossein Rezaei,
Shreya Nupur Shakya,
Md Nayem Uddin,
Eduardo Blanco
Abstract:
Yes-no questions expect a yes or no for an answer, but people often skip polar keywords. Instead, they answer with long explanations that must be interpreted. In this paper, we focus on this challenging problem and release new benchmarks in eight languages. We present a distant supervision approach to collect training data. We also demonstrate that direct answers (i.e., with polar keywords) are us…
▽ More
Yes-no questions expect a yes or no for an answer, but people often skip polar keywords. Instead, they answer with long explanations that must be interpreted. In this paper, we focus on this challenging problem and release new benchmarks in eight languages. We present a distant supervision approach to collect training data. We also demonstrate that direct answers (i.e., with polar keywords) are useful to train models to interpret indirect answers (i.e., without polar keywords). Experimental results demonstrate that monolingual fine-tuning is beneficial if training data can be obtained via distant supervision for the language of interest (5 languages). Additionally, we show that cross-lingual fine-tuning is always beneficial (8 languages).
△ Less
Submitted 20 October, 2023;
originally announced October 2023.
-
Concept-Centric Transformers: Enhancing Model Interpretability through Object-Centric Concept Learning within a Shared Global Workspace
Authors:
Jinyung Hong,
Keun Hee Park,
Theodore P. Pavlic
Abstract:
Many interpretable AI approaches have been proposed to provide plausible explanations for a model's decision-making. However, configuring an explainable model that effectively communicates among computational modules has received less attention. A recently proposed shared global workspace theory showed that networks of distributed modules can benefit from sharing information with a bottlenecked me…
▽ More
Many interpretable AI approaches have been proposed to provide plausible explanations for a model's decision-making. However, configuring an explainable model that effectively communicates among computational modules has received less attention. A recently proposed shared global workspace theory showed that networks of distributed modules can benefit from sharing information with a bottlenecked memory because the communication constraints encourage specialization, compositionality, and synchronization among the modules. Inspired by this, we propose Concept-Centric Transformers, a simple yet effective configuration of the shared global workspace for interpretability, consisting of: i) an object-centric-based memory module for extracting semantic concepts from input features, ii) a cross-attention mechanism between the learned concept and input embeddings, and iii) standard classification and explanation losses to allow human analysts to directly assess an explanation for the model's classification reasoning. We test our approach against other existing concept-based methods on classification tasks for various datasets, including CIFAR100, CUB-200-2011, and ImageNet, and we show that our model achieves better classification accuracy than all baselines across all problems but also generates more consistent concept-based explanations of classification output.
△ Less
Submitted 7 November, 2023; v1 submitted 25 May, 2023;
originally announced May 2023.
-
Adversarial Demonstration Attacks on Large Language Models
Authors:
Jiongxiao Wang,
Zichen Liu,
Keun Hee Park,
Zhuojun Jiang,
Zhaoheng Zheng,
Zhuofeng Wu,
Muhao Chen,
Chaowei Xiao
Abstract:
With the emergence of more powerful large language models (LLMs), such as ChatGPT and GPT-4, in-context learning (ICL) has gained significant prominence in leveraging these models for specific tasks by utilizing data-label pairs as precondition prompts. While incorporating demonstrations can greatly enhance the performance of LLMs across various tasks, it may introduce a new security concern: atta…
▽ More
With the emergence of more powerful large language models (LLMs), such as ChatGPT and GPT-4, in-context learning (ICL) has gained significant prominence in leveraging these models for specific tasks by utilizing data-label pairs as precondition prompts. While incorporating demonstrations can greatly enhance the performance of LLMs across various tasks, it may introduce a new security concern: attackers can manipulate only the demonstrations without changing the input to perform an attack. In this paper, we investigate the security concern of ICL from an adversarial perspective, focusing on the impact of demonstrations. We propose a novel attack method named advICL, which aims to manipulate only the demonstration without changing the input to mislead the models. Our results demonstrate that as the number of demonstrations increases, the robustness of in-context learning would decrease. Additionally, we also identify the intrinsic property of the demonstrations is that they can be used (prepended) with different inputs. As a result, it introduces a more practical threat model in which an attacker can attack the test input example even without knowing and manipulating it. To achieve it, we propose the transferable version of advICL, named Transferable-advICL. Our experiment shows that the adversarial demonstration generated by Transferable-advICL can successfully attack the unseen test input examples. We hope that our study reveals the critical security risks associated with ICL and underscores the need for extensive research on the robustness of ICL, particularly given its increasing significance in the advancement of LLMs.
△ Less
Submitted 14 October, 2023; v1 submitted 24 May, 2023;
originally announced May 2023.
-
Manipulation of Charge Delocalization in a Bulk Heterojunction Material Using a Mid-Infrared Push Pulse
Authors:
Angela Montanaro,
Kyu Hyung Park,
Francesca Fassioli,
Francesca Giusti,
Daniele Fausti,
Gregory D. Scholes
Abstract:
In organic bulk heterojunction materials, charge delocalization has been proposed to play a vital role in the generation of free carriers by reducing the Coulomb attraction via an interfacial charge transfer exciton (CTX). Pump-push-probe (PPP) experiments produced evidence that the excess energy given by a push pulse enhances delocalization, thereby increasing photocurrent. However, previous stud…
▽ More
In organic bulk heterojunction materials, charge delocalization has been proposed to play a vital role in the generation of free carriers by reducing the Coulomb attraction via an interfacial charge transfer exciton (CTX). Pump-push-probe (PPP) experiments produced evidence that the excess energy given by a push pulse enhances delocalization, thereby increasing photocurrent. However, previous studies have employed near-IR push pulses in the range 0.4-0.6 eV which is larger than the binding energy of a typical CTX. This raises the doubt that the push pulse may directly promote dissociation without involving delocalized states. Here, we perform PPP experiments with mid-IR push pulses at energies that are well below the binding energy of a CTX state (0.12-0.25 eV). We identify three types of CTX: delocalized, localized, and trapped. The excitation resides over multiple polymer chains in delocalized CTXs, while is restricted to a single chain (albeit maintaining a degree of intrachain delocalization) in localized CTXs. Trapped CTXs are instead completely localized. The pump pulse generates a hot delocalized CTX, which relaxes to a localized CTX, and eventually to trapped states. We find that photo-exciting localized CTXs with push pulses resonant to the mid-IR charge transfer absorption can promote delocalization and contribute to the formation of long-lived charge separated states. On the other hand, we found that trapped CTX are non-responsive to the push pulses. We hypothesize that delocalized states identified in prior studies are only accessible in systems where there is significant interchain electronic coupling or regioregularity that supports either interchain or intrachain polaron delocalization. This emphasizes the importance of engineering the micromorphology and energetics of the donor-acceptor interface to exploit a full potential of a material for photovoltaic applications.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Discovering the Effectiveness of Pre-Training in a Large-scale Car-sharing Platform
Authors:
Kyung Ho Park,
Hyunhee Chung
Abstract:
Recent progress of deep learning has empowered various intelligent transportation applications, especially in car-sharing platforms. While the traditional operations of the car-sharing service highly relied on human engagements in fleet management, modern car-sharing platforms let users upload car images before and after their use to inspect the cars without a physical visit. To automate the afore…
▽ More
Recent progress of deep learning has empowered various intelligent transportation applications, especially in car-sharing platforms. While the traditional operations of the car-sharing service highly relied on human engagements in fleet management, modern car-sharing platforms let users upload car images before and after their use to inspect the cars without a physical visit. To automate the aforementioned inspection task, prior approaches utilized deep neural networks. They commonly employed pre-training, a de-facto technique to establish an effective model under the limited number of labeled datasets. As candidate practitioners who deal with car images would presumably get suffered from the lack of a labeled dataset, we analyzed a sophisticated analogy into the effectiveness of pre-training is important. However, prior studies primarily shed a little spotlight on the effectiveness of pre-training. Motivated by the aforementioned lack of analysis, our study proposes a series of analyses to unveil the effectiveness of various pre-training methods in image recognition tasks at the car-sharing platform. We set two real-world image recognition tasks in the car-sharing platform in a live service, established them under the many-shot and few-shot problem settings, and scrutinized which pre-training method accomplishes the most effective performance in which setting. Furthermore, we analyzed how does the pre-training and fine-tuning convey different knowledge to the neural networks for a precise understanding.
△ Less
Submitted 2 May, 2023;
originally announced May 2023.
-
Femtosecond Photophysics of Molecular Polaritons
Authors:
Francesca Fassioli,
Kyu Hyung Park,
Sarah E. Bard,
Gregory D. Scholes
Abstract:
Molecular polaritons are hybrid states of photonic and molecular character that form when molecules strongly interact with light. Strong coupling tunes energy levels and importantly, can modify molecular properties (e.g. photoreaction rates) opening an avenue for novel polariton chemistry. In this perspective, we focus on the collective aspects of strongly coupled molecular systems and how this pe…
▽ More
Molecular polaritons are hybrid states of photonic and molecular character that form when molecules strongly interact with light. Strong coupling tunes energy levels and importantly, can modify molecular properties (e.g. photoreaction rates) opening an avenue for novel polariton chemistry. In this perspective, we focus on the collective aspects of strongly coupled molecular systems and how this pertains to the dynamical response of such systems, which though of key importance for attaining modified function under polariton formation, is still not well understood. We discuss how the ultrafast time and spectral resolution make pump-probe spectroscopy an ideal tool to reveal the energy transfer pathways from polariton states to other molecular states of functional interest. Finally, we illustrate how analyzing the free (rather than electronic) energy structure in molecular polariton systems may provide new clues into how energy flows and thus how strong coupling may be exploited.
△ Less
Submitted 11 February, 2023;
originally announced February 2023.
-
Towards an Efficient ML System: Unveiling a Trade-off between Task Accuracy and Engineering Efficiency in a Large-scale Car Sharing Platform
Authors:
Kyung Ho Park,
Hyunhee Chung,
Soonwoo Kwon
Abstract:
Upon the significant performance of the supervised deep neural networks, conventional procedures of developing ML system are \textit{task-centric}, which aims to maximize the task accuracy. However, we scrutinized this \textit{task-centric} ML system lacks in engineering efficiency when the ML practitioners solve multiple tasks in their domain. To resolve this problem, we propose an \textit{effici…
▽ More
Upon the significant performance of the supervised deep neural networks, conventional procedures of developing ML system are \textit{task-centric}, which aims to maximize the task accuracy. However, we scrutinized this \textit{task-centric} ML system lacks in engineering efficiency when the ML practitioners solve multiple tasks in their domain. To resolve this problem, we propose an \textit{efficiency-centric} ML system that concatenates numerous datasets, classifiers, out-of-distribution detectors, and prediction tables existing in the practitioners' domain into a single ML pipeline. Under various image recognition tasks in the real world car-sharing platform, our study illustrates how we established the proposed system and lessons learned from this journey as follows. First, the proposed ML system accomplishes supreme engineering efficiency while achieving a competitive task accuracy. Moreover, compared to the \textit{task-centric} paradigm, we discovered that the \textit{efficiency-centric} ML system yields satisfactory prediction results on multi-labelable samples, which frequently exist in the real world. We analyze these benefits derived from the representation power, which learned broader label spaces from the concatenated dataset. Last but not least, our study elaborated how we deployed this \textit{efficiency-centric} ML system is deployed in the real world live cloud environment. Based on the proposed analogies, we highly expect that ML practitioners can utilize our study to elevate engineering efficiency in their domain.
△ Less
Submitted 10 October, 2022;
originally announced October 2022.
-
Deep Dense Local Feature Matching and Vehicle Removal for Indoor Visual Localization
Authors:
Kyung Ho Park
Abstract:
Visual localization is an essential component of intelligent transportation systems, enabling broad applications that require understanding one's self location when other sensors are not available. It is mostly tackled by image retrieval such that the location of a query image is determined by its closest match in the previously collected images. Existing approaches focus on large scale localizati…
▽ More
Visual localization is an essential component of intelligent transportation systems, enabling broad applications that require understanding one's self location when other sensors are not available. It is mostly tackled by image retrieval such that the location of a query image is determined by its closest match in the previously collected images. Existing approaches focus on large scale localization where landmarks are helpful in finding the location. However, visual localization becomes challenging in small scale environments where objects are hardly recognizable. In this paper, we propose a visual localization framework that robustly finds the match for a query among the images collected from indoor parking lots. It is a challenging problem when the vehicles in the images share similar appearances and are frequently replaced such as parking lots. We propose to employ a deep dense local feature matching that resembles human perception to find correspondences and eliminating matches from vehicles automatically with a vehicle detector. The proposed solution is robust to the scenes with low textures and invariant to false matches caused by vehicles. We compare our framework with alternatives to validate our superiority on a benchmark dataset containing 267 pre-collected images and 99 query images taken from 34 sections of a parking lot. Our method achieves 86.9 percent accuracy, outperforming the alternatives.
△ Less
Submitted 25 May, 2022;
originally announced May 2022.
-
Entanglement between superconducting qubits and a tardigrade
Authors:
K. S. Lee,
Y. P. Tan,
L. H. Nguyen,
R. P. Budoyo,
K. H. Park,
C. Hufnagel,
Y. S. Yap,
N. Møbjerg,
V. Vedral,
T. Paterek,
R. Dumke
Abstract:
Quantum and biological systems are seldom discussed together as they seemingly demand opposing conditions. Life is complex, "hot and wet" whereas quantum objects are small, cold and well controlled. Here, we overcome this barrier with a tardigrade -- a microscopic multicellular organism known to tolerate extreme physiochemical conditions via a latent state of life known as cryptobiosis. We observe…
▽ More
Quantum and biological systems are seldom discussed together as they seemingly demand opposing conditions. Life is complex, "hot and wet" whereas quantum objects are small, cold and well controlled. Here, we overcome this barrier with a tardigrade -- a microscopic multicellular organism known to tolerate extreme physiochemical conditions via a latent state of life known as cryptobiosis. We observe coupling between the animal in cryptobiosis and a superconducting quantum bit and prepare a highly entangled state between this combined system and another qubit. The tardigrade itself is shown to be entangled with the remaining subsystems. The animal is then observed to return to its active form after 420 hours at sub 10 mK temperatures and pressure of $6\times 10^{-6}$ mbar, setting a new record for the conditions that a complex form of life can survive.
△ Less
Submitted 16 December, 2021; v1 submitted 15 December, 2021;
originally announced December 2021.
-
ICARUS-Q: Integrated Control and Readout Unit for Scalable Quantum Processors
Authors:
Kun Hee Park,
Yung Szen Yap,
Yuanzheng Paul Tan,
Christoph Hufnagel,
Long Hoang Nguyen,
Karn Hwa Lau,
Patrick Bore,
Stavros Efthymiou,
Stefano Carrazza,
Rangga P. Budoyo,
Rainer Dumke
Abstract:
We present a control and measurement setup for superconducting qubits based on Xilinx 16-channel radio-frequency system-on-chip (RFSoC) device. The proposed setup consists of four parts: multiple RFSoC boards, a setup to synchronise every digital to analog converter (DAC), and analog to digital converter (ADC) channel across multiple boards, a low-noise direct current (DC) supply for tuning the qu…
▽ More
We present a control and measurement setup for superconducting qubits based on Xilinx 16-channel radio-frequency system-on-chip (RFSoC) device. The proposed setup consists of four parts: multiple RFSoC boards, a setup to synchronise every digital to analog converter (DAC), and analog to digital converter (ADC) channel across multiple boards, a low-noise direct current (DC) supply for tuning the qubit frequency and cloud access for remotely performing experiments. We also design the setup to be free of physical mixers. The RFSoC boards directly generate microwave pulses using sixteen DAC channels up to the third Nyquist zone which are directly sampled by its eight ADC channels between the fifth and the ninth zones.
△ Less
Submitted 1 September, 2022; v1 submitted 6 December, 2021;
originally announced December 2021.
-
Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks
Authors:
Young Ah Choi,
Kyung Ho Park,
Eunji Park,
Huy Kang Kim
Abstract:
In the era of intelligent transportation, driver behavior profiling has become a beneficial technology as it provides knowledge regarding the driver's aggressiveness. Previous approaches achieved promising driver behavior profiling performance through establishing statistical heuristics rules or supervised learning-based models. Still, there exist limits that the practitioner should prepare a labe…
▽ More
In the era of intelligent transportation, driver behavior profiling has become a beneficial technology as it provides knowledge regarding the driver's aggressiveness. Previous approaches achieved promising driver behavior profiling performance through establishing statistical heuristics rules or supervised learning-based models. Still, there exist limits that the practitioner should prepare a labeled dataset, and prior approaches could not classify aggressive behaviors which are not known a priori. In pursuit of improving the aforementioned drawbacks, we propose a novel approach to driver behavior profiling leveraging an unsupervised learning paradigm. First, we cast the driver behavior profiling problem as anomaly detection. Second, we established recurrent neural networks that predict the next feature vector given a sequence of feature vectors. We trained the model with normal driver data only. As a result, our model yields high regression error given a sequence of aggressive driver behavior and low error given at a sequence of normal driver behavior. We figured this difference of error between normal and aggressive driver behavior can be an adequate flag for driver behavior profiling and accomplished a precise performance in experiments. Lastly, we further analyzed the optimal level of sequence length for identifying each aggressive driver behavior. We expect the proposed approach to be a useful baseline for unsupervised driver behavior profiling and contribute to the efficient, intelligent transportation ecosystem.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
Ghost factors in Gauss-sum factorization with transmon qubits
Authors:
Lin Htoo Zaw,
Yuanzheng Paul Tan,
Long Hoang Nguyen,
Rangga P. Budoyo,
Kun Hee Park,
Zhi Yang Koh,
Alessandro Landra,
Christoph Hufnagel,
Yung Szen Yap,
Teck Seng Koh,
Rainer Dumke
Abstract:
A challenge in the Gauss sums factorization scheme is the presence of ghost factors - non-factors that behave similarly to actual factors of an integer - which might lead to the misidentification of non-factors as factors or vice versa, especially in the presence of noise. We investigate Type II ghost factors, which are the class of ghost factors that cannot be suppressed with techniques previousl…
▽ More
A challenge in the Gauss sums factorization scheme is the presence of ghost factors - non-factors that behave similarly to actual factors of an integer - which might lead to the misidentification of non-factors as factors or vice versa, especially in the presence of noise. We investigate Type II ghost factors, which are the class of ghost factors that cannot be suppressed with techniques previously laid out in the literature. The presence of Type II ghost factors and the coherence time of the qubit set an upper limit for the total experiment time, and hence the largest factorizable number with this scheme. Discernability is a figure of merit introduced to characterize this behavior. We introduce preprocessing as a strategy to increase the discernability of a system, and demonstrate the technique with a transmon qubit. This can bring the total experiment time of the system closer to its decoherence limit, and increase the largest factorizable number.
△ Less
Submitted 8 December, 2021; v1 submitted 22 April, 2021;
originally announced April 2021.
-
Understand Watchdogs: Discover How Game Bot Get Discovered
Authors:
Eunji Park,
Kyung Ho Park,
Huy Kang Kim
Abstract:
The game industry has long been troubled by malicious activities utilizing game bots. The game bots disturb other game players and destroy the environmental system of the games. For these reasons, the game industry put their best efforts to detect the game bots among players' characters using the learning-based detections. However, one problem with the detection methodologies is that they do not p…
▽ More
The game industry has long been troubled by malicious activities utilizing game bots. The game bots disturb other game players and destroy the environmental system of the games. For these reasons, the game industry put their best efforts to detect the game bots among players' characters using the learning-based detections. However, one problem with the detection methodologies is that they do not provide rational explanations about their decisions. To resolve this problem, in this work, we investigate the explainabilities of the game bot detection. We develop the XAI model using a dataset from the Korean MMORPG, AION, which includes game logs of human players and game bots. More than one classification model has been applied to the dataset to be analyzed by applying interpretable models. This provides us explanations about the game bots' behavior, and the truthfulness of the explanations has been evaluated. Besides, interpretability contributes to minimizing false detection, which imposes unfair restrictions on human players.
△ Less
Submitted 19 January, 2021; v1 submitted 26 November, 2020;
originally announced November 2020.
-
Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort
Authors:
Kyung Ho Park,
Eunji Park,
Huy Kang Kim
Abstract:
Along with the importance of safety, an IDS has become a significant task in the real world. Prior studies proposed various intrusion detection models for the UAV. Past rule-based approaches provided a concrete baseline IDS model, and the machine learning-based method achieved a precise intrusion detection performance on the UAV with supervised learning models. However, previous methods have room…
▽ More
Along with the importance of safety, an IDS has become a significant task in the real world. Prior studies proposed various intrusion detection models for the UAV. Past rule-based approaches provided a concrete baseline IDS model, and the machine learning-based method achieved a precise intrusion detection performance on the UAV with supervised learning models. However, previous methods have room for improvement to be implemented in the real world. Prior methods required a large labeling effort on the dataset, and the model could not identify attacks that were not trained before. To jump over these hurdles, we propose an IDS with unsupervised learning. As unsupervised learning does not require labeling, our model let the practitioner not to label every type of attack from the flight data. Moreover, the model can identify an abnormal status of the UAV regardless of the type of attack. We trained an autoencoder with the benign flight data only and checked the model provides a different reconstruction loss at the benign flight and the flight under attack. We discovered that the model produces much higher reconstruction loss with the flight under attack than the benign flight; thus, this reconstruction loss can be utilized to recognize an intrusion to the UAV. With consideration of the computation overhead and the detection performance in the wild, we expect our model can be a concrete and practical baseline IDS on the UAV.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
Positron production using a 9 MeV electron linac for the GBAR experiment
Authors:
M. Charlton,
J. J. Choi,
M. Chung,
P. Clade,
P. Comini,
P-P. Crepin,
P. Crivelli,
O. Dalkarov,
P. Debu,
L. Dodd,
A. Douillet,
S. Guellati-Khelifa,
P-A. Hervieux,
L. Hilico,
A. Husson,
P. Indelicato,
G. Janka,
S. Jonsell,
J-P. Karr,
B. H. Kim,
E-S. Kim,
S. K. Kim,
Y. Ko,
T. Kosinski,
N. Kuroda
, et al. (45 additional authors not shown)
Abstract:
For the GBAR (Gravitational Behaviour of Antihydrogen at Rest) experiment at CERN's Antiproton Decelerator (AD) facility we have constructed a source of slow positrons, which uses a low-energy electron linear accelerator (linac). The driver linac produces electrons of 9 MeV kinetic energy that create positrons from bremsstrahlung-induced pair production. Staying below 10 MeV ensures no persistent…
▽ More
For the GBAR (Gravitational Behaviour of Antihydrogen at Rest) experiment at CERN's Antiproton Decelerator (AD) facility we have constructed a source of slow positrons, which uses a low-energy electron linear accelerator (linac). The driver linac produces electrons of 9 MeV kinetic energy that create positrons from bremsstrahlung-induced pair production. Staying below 10 MeV ensures no persistent radioactive activation in the target zone and that the radiation level outside the biological shield is safe for public access. An annealed tungsten-mesh assembly placed directly behind the target acts as a positron moderator. The system produces $5\times10^7$ slow positrons per second, a performance demonstrating that a low-energy electron linac is a superior choice over positron-emitting radioactive sources for high positron flux.
△ Less
Submitted 6 October, 2020; v1 submitted 10 June, 2020;
originally announced June 2020.
-
This Car is Mine!: Automobile Theft Countermeasure Leveraging Driver Identification with Generative Adversarial Networks
Authors:
Kyung Ho Park,
Huy Kang Kim
Abstract:
As a car becomes more connected, a countermeasure against automobile theft has become a significant task in the real world. To respond to automobile theft, data mining, biometrics, and additional authentication methods are proposed. Among current countermeasures, data mining method is one of the efficient ways to capture the owner driver's unique characteristics. To identify the owner driver from…
▽ More
As a car becomes more connected, a countermeasure against automobile theft has become a significant task in the real world. To respond to automobile theft, data mining, biometrics, and additional authentication methods are proposed. Among current countermeasures, data mining method is one of the efficient ways to capture the owner driver's unique characteristics. To identify the owner driver from thieves, previous works applied various algorithms toward driving data. Such data mining methods utilized supervised learning, thus required labeled data set. However, it is unrealistic to gather and apply the thief's driving pattern. To overcome this problem, we propose driver identification method with GAN. GAN has merit to build identification model by learning the owner driver's data only. We trained GAN only with owner driver's data and used trained discriminator to identify the owner driver. From actual driving data, we evaluated our identification model recognizes the owner driver well. By ensembling various driver authentication methods with the proposed model, we expect industry can develop automobile theft countermeasures available in the real world.
△ Less
Submitted 22 November, 2019;
originally announced November 2019.
-
Automobile Theft Detection by Clustering Owner Driver Data
Authors:
Yong Goo Kang,
Kyung Ho Park,
Huy Kang Kim
Abstract:
As automobiles become intelligent, automobile theft methods are evolving intelligently. Therefore automobile theft detection has become a major research challenge. Data-mining, biometrics, and additional authentication methods have been proposed to address automobile theft, in previous studies. Among these methods, data-mining can be used to analyze driving characteristics and identify a driver co…
▽ More
As automobiles become intelligent, automobile theft methods are evolving intelligently. Therefore automobile theft detection has become a major research challenge. Data-mining, biometrics, and additional authentication methods have been proposed to address automobile theft, in previous studies. Among these methods, data-mining can be used to analyze driving characteristics and identify a driver comprehensively. However, it requires a labeled driving dataset to achieve high accuracy. It is impractical to use the actual automobile theft detection system because real theft driving data cannot be collected in advance. Hence, we propose a method to detect an automobile theft attempt using only owner driving data. We cluster the key features of the owner driving data using the k-means algorithm. After reconstructing the driving data into one of these clusters, theft is detected using an error from the original driving data. To validate the proposed models, we tested our actual driving data and obtained 99% accuracy from the best model. This result demonstrates that our proposed method can detect vehicle theft by using only the car owner's driving data.
△ Less
Submitted 19 September, 2019;
originally announced September 2019.
-
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
Authors:
Kyung Ho Park,
Eunjo Lee,
Huy Kang Kim
Abstract:
With the rapid growth of MMORPG market, game bot detection has become an essential task for maintaining stable in-game ecosystem. To classify bots from normal users, detection methods are proposed in both game client and server-side. Among various classification methods, data mining method in server-side captured unique characteristics of bots efficiently. For features used in data mining, behavio…
▽ More
With the rapid growth of MMORPG market, game bot detection has become an essential task for maintaining stable in-game ecosystem. To classify bots from normal users, detection methods are proposed in both game client and server-side. Among various classification methods, data mining method in server-side captured unique characteristics of bots efficiently. For features used in data mining, behavioral and social actions of character are analyzed with numerous algorithms. However, bot developers can evade the previous detection methods by changing bot's activities continuously. Eventually, overall maintenance cost increases because the selected features need to be updated along with the change of bot's behavior. To overcome this limitation, we propose improved bot detection method with financial analysis. As bot's activity absolutely necessitates the change of financial status, analyzing financial fluctuation effectively captures bots as a key feature. We trained and tested model with actual data of Aion, a leading MMORPG in Asia. Leveraging that LSTM efficiently recognizes time-series movement of data, we achieved meaningful detection performance. Further on this model, we expect sustainable bot detection system in the near future.
△ Less
Submitted 10 August, 2019;
originally announced August 2019.
-
Polarization-Selective Control of Nonlinear Optomechanical Interactions in Subwavelength Elliptical Waveguides
Authors:
Dae Seok Han,
Il-Min Lee,
Kyung Hyun Park,
Myeong Soo Kang
Abstract:
Photonic devices exhibiting all-optically reconfigurable polarization dependence with a large dynamic range would be highly attractive for active polarization control. Here, we report that strongly polarization-selective nonlinear optomechanical interactions emerge in subwavelength waveguides. By using full-vectorial finite element analysis, we find that at certain core ellipticities (aspect ratio…
▽ More
Photonic devices exhibiting all-optically reconfigurable polarization dependence with a large dynamic range would be highly attractive for active polarization control. Here, we report that strongly polarization-selective nonlinear optomechanical interactions emerge in subwavelength waveguides. By using full-vectorial finite element analysis, we find that at certain core ellipticities (aspect ratios) the forward simulated light scattering mediated by a specific acoustic mode is eliminated for one polarization mode, whereas that for the other polarization mode is rather enhanced. This intriguing phenomenon can be explained by the interplay between the electrostrictive force and radiation pressure and turns out to be tailorable by choice of waveguide materials.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
A unification of the multiple twisted Euler and Genocchi numbers and polynomials associated with p adic q integral on Zp at q=-1
Authors:
Serkan Araci,
Mehmet Acikgoz,
Kyoung Ho Park,
Hassan Jolany
Abstract:
The present paper deals with unification of the multiple twisted Euler and Genocchi numbers and polynomials associated with p-adic q-integral on Zp at q = 1. Some earlier results of Ozden's papers in terms of unification of the multiple twisted Euler and Genocchi numbers and polynomials associated with p-adic q-integral on Zp at q = 1 can be deduced. We apply the method of generating function and…
▽ More
The present paper deals with unification of the multiple twisted Euler and Genocchi numbers and polynomials associated with p-adic q-integral on Zp at q = 1. Some earlier results of Ozden's papers in terms of unification of the multiple twisted Euler and Genocchi numbers and polynomials associated with p-adic q-integral on Zp at q = 1 can be deduced. We apply the method of generating function and p-adic q-integral representation on Zp, which are exploited to derive further classes of Euler polynomials and Genocchi polynomials. To be more precise we summarize our results as follows, we obtain some relations between H.Ozden's generating function and fermionic p-adic q-integral on Zp at q = 1. Furthermore we derive Witt's type formula for the unification of twisted Euler and Genocchi polynomials. Also we derive distribution formula (Multiplication Theorem) for multiple twisted Euler and Genocchi numbers and polynomials associated with p-adic q-integral on Zp at q = 1 which yields a deeper insight into the effectiveness of this type of generalizations. Furthermore we define unification of multiple twisted zeta function and we obtain an interpolation formula between unification of multiple twisted zeta function and unification of the multiple twisted Euler and Genocchi numbers at negative integer. Our new generating function possess a number of interesting properties which we state in this paper.
△ Less
Submitted 5 January, 2012;
originally announced January 2012.
-
Identities of symmetry for Bernoulli polynomials arising from quotients of Volkenborn integrals invariant under S_3
Authors:
Dae San Kim,
Kyoung Ho Park
Abstract:
In this paper, we derive eight basic identities of symmetry in three variables related to Bernoulli polynomials and power sums. These and most of their corollaries are new, since there have been results only about identities of symmetry in two variables. These abundance of symmetries shed new light even on the existing identities so as to yield some further interesting ones. The derivations of ide…
▽ More
In this paper, we derive eight basic identities of symmetry in three variables related to Bernoulli polynomials and power sums. These and most of their corollaries are new, since there have been results only about identities of symmetry in two variables. These abundance of symmetries shed new light even on the existing identities so as to yield some further interesting ones. The derivations of identities are based on the $p$-adic integral expression of the generating function for the Bernoulli polynomials and the quotient of integrals that can be expressed as the exponential generating function for the power sums.
△ Less
Submitted 17 March, 2010;
originally announced March 2010.
-
Identities of symmetry for Euler polynomials arising from quotients of fermionic integrals invariant under S_3
Authors:
Dae San Kim,
Kyoung Ho Park
Abstract:
In this paper, we derive eight basic identities of symmetry in three variables related to Euler polynomials and alternating power sums. These and most of their corollaries are new, since there have been results only about identities of symmetry in two variables. These abundance of symmetries shed new light even on the existing identities so as to yield some further interesting ones. The derivation…
▽ More
In this paper, we derive eight basic identities of symmetry in three variables related to Euler polynomials and alternating power sums. These and most of their corollaries are new, since there have been results only about identities of symmetry in two variables. These abundance of symmetries shed new light even on the existing identities so as to yield some further interesting ones. The derivations of identities are based on the $p$-adic integral expression of the generating function for the Euler polynomials and the quotient of integrals that can be expressed as the exponential generating function for the alternating power sums.
△ Less
Submitted 17 March, 2010;
originally announced March 2010.