Skip to main content

Showing 1–17 of 17 results for author: Rho, S

  1. arXiv:2406.06615  [pdf, other

    cs.CL cs.AI cs.LG cs.RO

    Language Guided Skill Discovery

    Authors: Seungeun Rho, Laura Smith, Tianyu Li, Sergey Levine, Xue Bin Peng, Sehoon Ha

    Abstract: Skill discovery methods enable agents to learn diverse emergent behaviors without explicit rewards. To make learned skills useful for unknown downstream tasks, obtaining a semantically diverse repertoire of skills is essential. While some approaches introduce a discriminator to distinguish skills and others aim to increase state coverage, no existing work directly addresses the "semantic diversity… ▽ More

    Submitted 7 June, 2024; originally announced June 2024.

  2. arXiv:2401.01073  [pdf, other

    cs.PL cs.SE

    Taming the Beast: Fully Automated Unit Testing with Coyote C++

    Authors: Sanghoon Rho, Philipp Martens, Seungcheol Shin, Yeoneo Kim

    Abstract: In this paper, we present Coyote C++, a fully automated white-box unit testing tool for C and C++. Whereas existing tools have struggled to realize unit test generation for C++, Coyote C++ is able to produce high coverage results from unit test generation at a testing speed of over 10,000 statements per hour. This impressive feat is made possible by the combination of a powerful concolic execution… ▽ More

    Submitted 4 January, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

  3. arXiv:2310.14500  [pdf, other

    cs.PL cs.SE

    Coyote C++: An Industrial-Strength Fully Automated Unit Testing Tool

    Authors: Sanghoon Rho, Philipp Martens, Seungcheol Shin, Yeoneo Kim, Hoon Heo, SeungHyun Oh

    Abstract: Coyote C++ is an automated testing tool that uses a sophisticated concolic-execution-based approach to realize fully automated unit testing for C and C++. While concolic testing has proven effective for languages such as C and Java, tools have struggled to achieve a practical level of automation for C++ due to its many syntactical intricacies and overall complexity. Coyote C++ is the first automat… ▽ More

    Submitted 22 October, 2023; originally announced October 2023.

  4. arXiv:2310.06404  [pdf, other

    cs.CL cs.AI cs.LG

    Hexa: Self-Improving for Knowledge-Grounded Dialogue System

    Authors: Daejin Jo, Daniel Wontae Nam, Gunsoo Han, Kyoung-Woon On, Taehwan Kwon, Seungeun Rho, Sungwoong Kim

    Abstract: A common practice in knowledge-grounded dialogue generation is to explicitly utilize intermediate steps (e.g., web-search, memory retrieval) with modular approaches. However, data for such steps are often inaccessible compared to those of dialogue responses as they are unobservable in an ordinary dialogue. To fill in the absence of these data, we develop a self-improving method to improve the gene… ▽ More

    Submitted 2 April, 2024; v1 submitted 10 October, 2023; originally announced October 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  5. Machine Learning Based Missing Values Imputation in Categorical Datasets

    Authors: Muhammad Ishaq, Sana Zahir, Laila Iftikhar, Mohammad Farhad Bulbul, Seungmin Rho, Mi Young Lee

    Abstract: In order to predict and fill in the gaps in categorical datasets, this research looked into the use of machine learning algorithms. The emphasis was on ensemble models constructed using the Error Correction Output Codes framework, including models based on SVM and KNN as well as a hybrid classifier that combines models based on SVM, KNN,and MLP. Three diverse datasets, the CPU, Hypothyroid, and Br… ▽ More

    Submitted 12 September, 2024; v1 submitted 9 June, 2023; originally announced June 2023.

    Comments: 13 pages

  6. arXiv:2305.13973  [pdf, other

    cs.CL

    Effortless Integration of Memory Management into Open-Domain Conversation Systems

    Authors: Eunbi Choi, Kyoung-Woon On, Gunsoo Han, Sungwoong Kim, Daniel Wontae Nam, Daejin Jo, Seung Eun Rho, Taehwan Kwon, Minjoon Seo

    Abstract: Open-domain conversation systems integrate multiple conversation skills into a single system through a modular approach. One of the limitations of the system, however, is the absence of management capability for external memory. In this paper, we propose a simple method to improve BlenderBot3 by integrating memory management ability into it. Since no training data exists for this purpose, we propo… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  7. arXiv:2303.17614  [pdf, other

    cs.HC cs.AI eess.SP

    Estimating Continuous Muscle Fatigue For Multi-Muscle Coordinated Exercise: A Pilot Study

    Authors: Chunzhi Yi, Baichun Wei, Wei Jin, Jianfei Zhu, Seungmin Rho, Zhiyuan Chen, Feng Jiang

    Abstract: Assessing the progression of muscle fatigue for daily exercises provides vital indicators for precise rehabilitation, personalized training dose, especially under the context of Metaverse. Assessing fatigue of multi-muscle coordination-involved daily exercises requires the neuromuscular features that represent the fatigue-induced characteristics of spatiotemporal adaptions of multiple muscles and… ▽ More

    Submitted 29 March, 2023; originally announced March 2023.

    Comments: submitted to IEEE JBHI

  8. arXiv:2303.14084  [pdf, other

    cs.LG cs.DS stat.ML

    Differentially Private Synthetic Control

    Authors: Saeyoung Rho, Rachel Cummings, Vishal Misra

    Abstract: Synthetic control is a causal inference tool used to estimate the treatment effects of an intervention by creating synthetic counterfactual data. This approach combines measurements from other similar observations (i.e., donor pool ) to predict a counterfactual time series of interest (i.e., target unit) by analyzing the relationship between the target and the donor pool before the intervention. A… ▽ More

    Submitted 24 March, 2023; originally announced March 2023.

  9. arXiv:2303.03451  [pdf, other

    cs.LG cs.CR

    Improved Differentially Private Regression via Gradient Boosting

    Authors: Shuai Tang, Sergul Aydore, Michael Kearns, Saeyoung Rho, Aaron Roth, Yichen Wang, Yu-Xiang Wang, Zhiwei Steven Wu

    Abstract: We revisit the problem of differentially private squared error linear regression. We observe that existing state-of-the-art methods are sensitive to the choice of hyperparameters -- including the ``clipping threshold'' that cannot be set optimally in a data-independent way. We give a new algorithm for private linear regression based on gradient boosting. We show that our method consistently improv… ▽ More

    Submitted 20 May, 2023; v1 submitted 6 March, 2023; originally announced March 2023.

  10. arXiv:2210.05409  [pdf, other

    cs.LG cs.AI

    LECO: Learnable Episodic Count for Task-Specific Intrinsic Reward

    Authors: Daejin Jo, Sungwoong Kim, Daniel Wontae Nam, Taehwan Kwon, Seungeun Rho, Jongmin Kim, Donghoon Lee

    Abstract: Episodic count has been widely used to design a simple yet effective intrinsic motivation for reinforcement learning with a sparse reward. However, the use of episodic count in a high-dimensional state space as well as over a long episode time requires a thorough state compression and fast hashing, which hinders rigorous exploitation of it in such hard and complex exploration environments. Moreove… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: Accepted to NeurIPS 2022

  11. arXiv:2004.13122  [pdf

    eess.IV cs.LG stat.ML

    Development of a Machine-Learning System to Classify Lung CT Scan Images into Normal/COVID-19 Class

    Authors: Seifedine Kadry, Venkatesan Rajinikanth, Seungmin Rho, Nadaradjane Sri Madhava Raja, Vaddi Seshagiri Rao, Krishnan Palani Thanaraj

    Abstract: Recently, the lung infection due to Coronavirus Disease (COVID-19) affected a large human group worldwide and the assessment of the infection rate in the lung is essential for treatment planning. This research aims to propose a Machine-Learning-System (MLS) to detect the COVID-19 infection using the CT scan Slices (CTS). This MLS implements a sequence of methods, such as multi-thresholding, image… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: 16 PAGES

  12. arXiv:1912.03717  [pdf, other

    cs.IT eess.SP

    Hand and Body Blockage Measurements with Form-Factor User Equipment at 28 GHz

    Authors: Vasanthan Raghavan, Sonsay Noimanivone, Sung Kil Rho, Bernie Farin, Patrick Connor, Ricardo A. Motos, Yu-Chin Ou, Kobi Ravid, M. Ali Tassoudji, Ozge H. Koymen, Junyi Li

    Abstract: Blockage by the human hand/body is an important impairment in realizing practical millimeter wave wireless systems. Prior works on blockage modeling are either based on theoretical studies of double knife edge diffraction or its modifications, high-frequency simulations of electromagnetic effects, or measurements with experimental millimeter wave prototypes. While such studies are useful, they do… ▽ More

    Submitted 8 December, 2019; originally announced December 2019.

    Comments: 15 pages, 9 figures, 6 tables

  13. arXiv:1904.03821  [pdf

    cs.AI cs.LG

    Creating Pro-Level AI for a Real-Time Fighting Game Using Deep Reinforcement Learning

    Authors: Inseok Oh, Seungeun Rho, Sangbin Moon, Seongho Son, Hyoil Lee, Jinyun Chung

    Abstract: Reinforcement learning combined with deep neural networks has performed remarkably well in many genres of games recently. It has surpassed human-level performance in fixed game environments and turn-based two player board games. However, to the best of our knowledge, current research has yet to produce a result that has surpassed human-level performance in modern complex fighting games. This is du… ▽ More

    Submitted 31 January, 2020; v1 submitted 7 April, 2019; originally announced April 2019.

    Comments: 8 pages

  14. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

    Authors: Khan Muhammad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik

    Abstract: Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least significant bit substitution method (M-LSB-SM) for RGB images. The proposed method is based on the achromatic component (I-plane) of the hue-saturation-intensity (H… ▽ More

    Submitted 5 June, 2015; originally announced June 2015.

    Comments: This paper has been published in Multimedia Tools and Applications Journal with impact factor=1.058. The readers can study the formatted paper using the following link: http://link.springer.com/article/10.1007/s11042-015-2671-9. Please use sci-hub.org for downloading this paper if you are unable to access it freely or email us at khan.muhammad.icp@gmail.com

    Journal ref: Multimedia Tools and Applications, pp. 1-27, 2015

  15. arXiv:1502.07041  [pdf

    cs.IR cs.CV

    Describing Colors, Textures and Shapes for Content Based Image Retrieval - A Survey

    Authors: Jamil Ahmad, Muhammad Sajjad, Irfan Mehmood, Seungmin Rho, Sung Wook Baik

    Abstract: Visual media has always been the most enjoyed way of communication. From the advent of television to the modern day hand held computers, we have witnessed the exponential growth of images around us. Undoubtedly it's a fact that they carry a lot of information in them which needs be utilized in an effective manner. Hence intense need has been felt to efficiently index and store large image collecti… ▽ More

    Submitted 24 February, 2015; originally announced February 2015.

    Journal ref: (2014), Journal of Platform Technology 2(4): 34-48

  16. Holistic Collaborative Privacy Framework for Users' Privacy in Social Recommender Service

    Authors: Ahmed M. Elmisery, Seungmin Rho, Dmitri Botvich

    Abstract: The current business model for existing recommender services is centered around the availability of users' personal data at their side whereas consumers have to trust that the recommender service providers will not use their data in a malicious way. With the increasing number of cases for privacy breaches, different countries and corporations have issued privacy laws and regulations to define the… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

    Report number: ICT Platform Society Volume 02-01 ACM Class: D.4.6; K.6.m

    Journal ref: Journal of Platform Technology, March 2014 Volume 02-01 Pages 11-31

  17. arXiv:math/0212242  [pdf, ps, other

    math.OA

    Some intrinsic properties of simple graph $C^*$-algebras

    Authors: David Pask, Seung-Jai Rho

    Abstract: To a directed graph $E$ is associated a $C^*$-algebra $C^* (E)$ called a graph $C^*$-algebra. There is a canonical action $γ$ of ${\bf T}$ on $C^* (E)$, called the gauge action. In this paper we present necessary and sufficient conditions for the fixed point algebra $C^* (E)^γ$ to be simple. Our results also yield some structure theorems for simple graph algebras.

    Submitted 18 December, 2002; originally announced December 2002.

    Comments: 15 pages with one embedded diagram. To appear, Proc. OAMP conference, Constanta, 2001

    MSC Class: 46L55