Skip to main content

Showing 1–14 of 14 results for author: Tan, C H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.19664  [pdf, other

    cs.RO cs.LG

    Towards Generalist Robot Learning from Internet Video: A Survey

    Authors: Robert McCarthy, Daniel C. H. Tan, Dominik Schmidt, Fernando Acero, Nathan Herr, Yilun Du, Thomas G. Thuruthel, Zhibin Li

    Abstract: This survey presents an overview of methods for learning from video (LfV) in the context of reinforcement learning (RL) and robotics. We focus on methods capable of scaling to large internet video datasets and, in the process, extracting foundational knowledge about the world's dynamics and physical human behaviour. Such methods hold great promise for developing general-purpose robots. We open w… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  2. Monocular UAV Localisation with Deep Learning and Uncertainty Propagation

    Authors: Xueyan Oh, Ryan Lim, Leonard Loh, Chee How Tan, Shaohui Foong, U-Xuan Tan

    Abstract: In this paper, we propose a ground-based monocular UAV localisation system that detects and localises an LED marker attached to the underside of a UAV. Our system removes the need for extensive infrastructure and calibration unlike existing technologies such as UWB, radio frequency and multi-camera systems often used for localisation in GPS-denied environment. To improve deployablity for real-worl… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

    Comments: This paper has been accepted by IEEE Robotics and Automation Letters (Volume: 7, Issue: 3, July 2022) with DOI: https://doi.org/10.1109/LRA.2022.3186750

  3. arXiv:2306.04026  [pdf, other

    cs.LG cs.AI cs.RO

    Value Functions are Control Barrier Functions: Verification of Safe Policies using Control Theory

    Authors: Daniel C. H. Tan, Fernando Acero, Robert McCarthy, Dimitrios Kanoulas, Zhibin Li

    Abstract: Guaranteeing safe behaviour of reinforcement learning (RL) policies poses significant challenges for safety-critical applications, despite RL's generality and scalability. To address this, we propose a new approach to apply verification methods from control theory to learned value functions. By analyzing task structures for safety preservation, we formalize original theorems that establish links b… ▽ More

    Submitted 5 December, 2023; v1 submitted 6 June, 2023; originally announced June 2023.

  4. arXiv:2305.18431  [pdf, other

    cs.IR cs.AI cs.LG

    Optimizing Airbnb Search Journey with Multi-task Learning

    Authors: Chun How Tan, Austin Chan, Malay Haldar, Jie Tang, Xin Liu, Mustafa Abdool, Huiji Gao, Liwei He, Sanjeev Katariya

    Abstract: At Airbnb, an online marketplace for stays and experiences, guests often spend weeks exploring and comparing multiple items before making a final reservation request. Each reservation request may then potentially be rejected or cancelled by the host prior to check-in. The long and exploratory nature of the search journey, as well as the need to balance both guest and host preferences, present uniq… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

    Comments: Search Ranking, Recommender Systems, User Search Journey, Multi-task learning, Two-sided marketplace

  5. arXiv:2301.10894  [pdf, other

    cs.RO

    Perceptive Locomotion with Controllable Pace and Natural Gait Transitions Over Uneven Terrains

    Authors: Daniel Chee Hian Tan, Jenny Zhang, Michael, Chuah, Zhibin Li

    Abstract: This work developed a learning framework for perceptive legged locomotion that combines visual feedback, proprioceptive information, and active gait regulation of foot-ground contacts. The perception requires only one forward-facing camera to obtain the heightmap, and the active regulation of gait paces and traveling velocity are realized through our formulation of CPG-based high-level imitation o… ▽ More

    Submitted 30 January, 2023; v1 submitted 25 January, 2023; originally announced January 2023.

  6. arXiv:2201.01669  [pdf, other

    eess.AS cs.LG cs.SD

    Using Deep Learning with Large Aggregated Datasets for COVID-19 Classification from Cough

    Authors: Esin Darici Haritaoglu, Nicholas Rasmussen, Daniel C. H. Tan, Jennifer Ranjani J., Jaclyn Xiao, Gunvant Chaudhari, Akanksha Rajput, Praveen Govindan, Christian Canham, Wei Chen, Minami Yamaura, Laura Gomezjurado, Aaron Broukhim, Amil Khanzada, Mert Pilanci

    Abstract: The Covid-19 pandemic has been one of the most devastating events in recent history, claiming the lives of more than 5 million people worldwide. Even with the worldwide distribution of vaccines, there is an apparent need for affordable, reliable, and accessible screening techniques to serve parts of the World that do not have access to Western medicine. Artificial Intelligence can provide a soluti… ▽ More

    Submitted 29 March, 2022; v1 submitted 5 January, 2022; originally announced January 2022.

  7. arXiv:1909.11251  [pdf

    cs.LG stat.ML

    Online Semi-Supervised Concept Drift Detection with Density Estimation

    Authors: Chang How Tan, Vincent CS Lee, Mahsa Salehi

    Abstract: Concept drift is formally defined as the change in joint distribution of a set of input variables X and a target variable y. The two types of drift that are extensively studied are real drift and virtual drift where the former is the change in posterior probabilities p(y|X) while the latter is the change in distribution of X without affecting the posterior probabilities. Many approaches on concept… ▽ More

    Submitted 10 November, 2019; v1 submitted 24 September, 2019; originally announced September 2019.

  8. arXiv:1902.00241  [pdf, ps, other

    cs.CR

    Key Recovery Attack on Rank Quasi-Cyclic Code-based Signature Scheme

    Authors: Terry Shue Chien Lau, Chik How Tan

    Abstract: Rank Quasi-Cyclic Signature (RQCS) is a rank metric code-based signature scheme based on the Rank Quasi-Cyclic Syndrome Decoding (RQCSD) problem proposed by Song et al. in [2]. Their paper was accepted in the 22nd International Conference on Practice and Theory of Public Key Cryptography (PKC 2019). They have also shown that RQCS is EUF-CMA in the random oracle model. This short paper describes ho… ▽ More

    Submitted 1 February, 2019; originally announced February 2019.

    Comments: 4 pages, the full version will be made available later; The second reference is: Y. Song, X. Huang, Y. Mu, and W. Wu. A New Code-based Signature Scheme with Shorter Public Key. Available at https://eprint.iacr.org/2019/053.pdf which is accepted in the PKC 2019. The proceedings will be made available later

    MSC Class: 94B05; 94A60

    Journal ref: P. Gaborit, O. Ruatta, J. Schrek, G. Zemor. New results for rank-based cryptography. In Progress in Cryptology (AFRICACRYPT 2014), pp. 1-12

  9. arXiv:1806.02536  [pdf, ps, other

    cs.CR

    On the near prime-order MNT curves

    Authors: Duc-Phong Le, Nadia El Mrabet, Safia Haloui, Chik How Tan

    Abstract: In their seminar paper, Miyaji, Nakabayashi and Takano introduced the first method to construct families of prime-order elliptic curves with small embedding degrees, namely k = 3, 4, and 6. These curves, so-called MNT curves, were then extended by Scott and Barreto, and also Galbraith, McKee and Valenca to near prime-order curves with the same embedding degrees. In this paper, we extend the method… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: 15 pages

  10. arXiv:1411.3643  [pdf, ps, other

    cs.IT math.CO

    Six Constructions of Difference Families

    Authors: Cunsheng Ding, Chik How Tan, Yin Tan

    Abstract: In this paper, six constructions of difference families are presented. These constructions make use of difference sets, almost difference sets and disjoint difference families, and give new point of views of relationships among these combinatorial objects. Most of the constructions work for all finite groups. Though these constructions look simple, they produce many difference families with new pa… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

    MSC Class: 05B05; 05B10

  11. arXiv:1407.4884  [pdf, ps, other

    cs.IT

    A new construction of differentially 4-uniform permutations over $F_{2^{2k}}$

    Authors: Jie Peng, Chik How Tan, Qichun Wang

    Abstract: Permutations over $F_{2^{2k}}$ with low differential uniform, high algebraic degree and high nonlinearity are of great cryptographical importance since they can be chosen as the substitution boxes (S-boxes) for many block ciphers. A well known example is that the Advanced Encryption Standard (AES) chooses a differentially 4-uniform permutation, the multiplicative inverse function, as its S-box. In… ▽ More

    Submitted 18 July, 2014; originally announced July 2014.

    Comments: 18pages

  12. arXiv:1305.2694  [pdf, ps, other

    cs.CR

    Further Refinements of Miller Algorithm on Edwards curves

    Authors: Duc-Phong Le, Chik How Tan

    Abstract: Recently, Edwards curves have received a lot of attention in the cryptographic community due to their fast scalar multiplication algorithms. Then, many works on the application of these curves to pairing-based cryptography have been introduced. Xu and Lin (CT-RSA, 2010) presented refinements to improve the Miller algorithm that is central role compute pairings on Edwards curves. In this paper, we… ▽ More

    Submitted 4 August, 2014; v1 submitted 13 May, 2013; originally announced May 2013.

    Comments: 10 pages

    ACM Class: G.4; I.1.2

  13. arXiv:1207.0269   

    cs.CR

    Breaking the Estream Finalists and AES Modes of Operation Faster than Exhaustive Search

    Authors: Khoongming Khoo, Chik How Tan

    Abstract: This paper explores the time-memory-data trade-off attack on stream and block ciphers.

    Submitted 22 October, 2012; v1 submitted 1 July, 2012; originally announced July 2012.

    Comments: This paper has been withdrawn by the authors

  14. arXiv:1110.3177  [pdf, ps, other

    cs.IT

    On a Class of Quadratic Polynomials with no Zeros and its Application to APN Functions

    Authors: Carl Bracken, Chik How Tan, Tan Yin

    Abstract: We show that the there exists an infinite family of APN functions of the form $F(x)=x^{2^{s}+1} + x^{2^{k+s}+2^k} + cx^{2^{k+s}+1} + c^{2^k}x^{2^k + 2^s} + δx^{2^{k}+1}$, over $\gf_{2^{2k}}$, where $k$ is an even integer and $\gcd(2k,s)=1, 3\nmid k$. This is actually a proposed APN family of Lilya Budaghyan and Claude Carlet who show in \cite{carlet-1} that the function is APN when there exists… ▽ More

    Submitted 14 October, 2011; originally announced October 2011.