K. Liang
29 records found
1
Automatic Hand Landmark Detection for Leprosy Diagnosis
Comparison of Output Adaptation Techniques for Hand Keypoint Prediction
Early detection of leprosy, a neglected tropical disease, is crucial to preventing irreversible nerve damage and disability. Analyzing temperature vari- ations in hands using infrared (IR) cameras offers a potential low-cost alternative to existing medical equipment for early det
...
In this work, we investigate how domain adaptation techniques can improve the performance of hand landmark detection models originally trained on RGB images when deployed on infrared (IR) data. Our motivation stems from a medical use case in Nepal, where clin ...
Hand landmark detection in infrared (IR) images is essential for early leprosy diagnosis in developing countries like Nepal, helping to prevent serious complications and disability. However, current hand landmark detection models, such as Google’s detection models comprised in th
...
Skin temperature measurement for diagnosing leprosy in Nepal
Automatically measuring localized changes in temperature in the hand using IR-RGB thermography
This study investigates sensor technologies for di- agnosing leprosy in Nepal, focussing on skin tem- perature in the hands using contact and non-contact sensors. Leprosy affects the peripheral nervous system, causing thermoregulatory dysfunction de- tectable via localized skin t
...
Leprosy remains a significant health challenge in developing countries, where early diagnosis is crucial to prevent severe disabilities and social stigma. Recent studies have shown that infrared imaging can be used to detect abnormalities associated with leprosy by analyzing hand
...
Red Teaming Large Language Models for Code
Exploring Dangerous and Unfair Software Applications
The rapid advancement of large language models has enabled numerous innovative, but also harmful applications. It is therefore essential to create these models to behave safely and responsibly. One way to improve these models is by red teaming them. In this study, we aim to ident
...
Implications of LLMs4Code on Copyright Infringement
An Exploratory Study Through Red Teaming
Large Language Models (LLMs) have experienced a rapid increase in usage across numerous sectors in recent years. However, this growth brings a greater risk of misuse. This paper explores the issue of copyright infringement facilitated by LLMs in the domain of software engineering
...
Large Language Models (LLMs) are increasingly used in software development, but their potential for misuse in generating harmful code, such as malware, raises significant concerns. We present a red-teaming approach to assess the safety and ethical alignment of LLMs in the context
...
This paper explores the integration of weighted vot-ing mechanisms into DAG-based consensus proto-cols, such as Tusk [EuroSys’22], which promise high throughput and low latency. Weighted voting,
pioneered by protocols like WHEAT [SRDS’15] and AWARE [TDSC’20], aims to optimize ...
pioneered by protocols like WHEAT [SRDS’15] and AWARE [TDSC’20], aims to optimize ...
Streamlined Byzantine Fault Tolerant (BFT) protocols, such as HotStuff [PODC'19], and weighted voting represent two possible strategies to improve consensus in the distributed systems world. Several studies have been conducted on both techniques, but the research on
...
Using Weighted Voting to Accelerate Blockchain Consensus
How to make sure that the latency that the nodes report prior to AWARE’s algorithm is realistic?
This research addresses the challenge of managing latency in distributed computer systems. Maintaining correct delays in data transmission across various network conditions is crucial for system efficiency and security. We focus on improving the Adaptive Wide-Area Replication (AW
...
Sound pollution is becoming an increasingly pressing issue in today’s world. To effectively address it, it must be measured. To this end, Serval was developed, an edge-ai powered sound recognition solution. Its lack of accuracy, however, makes it difficult to deploy. This thesis
...
The rapid evolution of 5G technology has paved the way for the proliferation of resource-constrained Internet of Things (IoT) devices, collectively known as ambient IoT. While these devices offer unprecedented opportunities for connectivity and data collection, their limited com
...
Hidden spy cameras are a growing worldwide threat to people’s intimacy and privacy. With the growing interest in full-screen devices and the underlying development of under-screen cameras, a new type of potential security risk is introduced. Recent smartphones such as the ZTE AXO
...
Privacy concerns in federated learning have attracted considerable attention recently. In centralized networks, it has been observed that even without directly exchanging raw training data, the exchange of other so-called intermediate parameters such as weights/gradients can stil
...
A computer-checked library of category theory
Defining functors and their algebras
Category theory is a branch of abstract mathematics that aims to give a high-level overview of relations between objects. Proof assistants are tools that aid in verifying the correctness of mathematical proofs. To reason about category theory using such assistants, fundamental no
...
The monad and examples from Haskell
A computer-checked library for Category Theory in Lean
Category Theory is a widely used field of Mathematics.
Some concepts from it are often used in functional programming.
This paper will focus on the Monad and a few implementations of it from Haskell.
We will also present the computer-checked library we have written to ...
Some concepts from it are often used in functional programming.
This paper will focus on the Monad and a few implementations of it from Haskell.
We will also present the computer-checked library we have written to ...
A Computer-Checked Library of Category Theory
Universal Properties of Category Theory in Functional Programming
Category theory is a branch of mathematics that is used to abstract and generalize other mathematical concepts. Its core idea is to take the emphasis off the details of the elements of these concepts and put it on the relationships between them instead. The elements can then be c
...
A computer-checked library of category theory
Formally verifying currying via the product-exponential adjunction
Existing implementations of category theory for proof assistants aim to be as generic as possible in order to be reusable and extensible, often at the expense of readability and clarity. We present a (partial) formalisation of category theory in the proof assistant Lean limited i
...
Blockchain technology has revolutionized the way data is stored, managed, and shared across various industries. Its decentralized nature and immutability make it highly attractive in use cases that require transparency, integrity, and accountability. However, some applications de
...