Institute of Information Science
近期研究成果
Current Research Results
Authors: Wai-Kok Choong, Jen-Hung Wang, Ting-Yi Sung

Ting-YiSungJen-HungWangWai-kokChoong Abstract:
Identifying single-amino-acid variants (SAVs) from mass spectrometry-based experiments is critical for validating single-nucleotide variants (SNVs) at the protein level to facilitate biomedical research. Currently, two approaches are usually applied to convert SNV annotations into SAV-harboring protein sequences. One approach generates one sequence containing exactly one SAV, and the other all SAVs. However, they may neglect the possibility of SAV combinations, e.g., haplotypes, existing in bio-samples. Therefore, it is necessary to consider all SAV combinations of a protein when generating SAV-harboring protein sequences. In this paper, we propose MinProtMaxVP, a novel approach which selects a minimized number of SAV-harboring protein sequences generated from the exhaustive approach, while still accommodating all possible variant peptides, by solving a classic set covering problem. Our study on known haplotype variations of TAS2R38 justifies the necessity for MinProtMaxVP to consider all combinations of SAVs. The performance of MinProtMaxVP is demonstrated by an in silico study on OR2T27 with five SAVs and real experimental data of the HEK293 cell line. Furthermore, assuming simulated somatic and germline variants of OR2T27 in tumor and normal tissues demonstrates that when adopting the appropriate somatic and germline SAV integration strategy, MinProtMaxVP is adaptable to labeling and label-free mass spectrometry-based experiments.
Current Research Results
Authors: Sung-Hsien Hsieh, Wei-Jie Liang, Chun-Shien Lu, and Soo-Chang Pei

Chun-ShienLu Abstract:
Distributed compressive sensing (DCS) is a framework that considers joint sparsity within signal ensembles along with multiple measurement vectors (MMVs).
However, current theoretical bounds of the probability of perfect recovery for MMVs are derived to be essentially identical to that of a single MV (SMV); this is because characteristics of the signal ensemble are ignored.
In this paper, we introduce two key ingredients, called ``Euclidean distances between signals'' and ``decay rate of signal ensemble,'' to conduct a performance analysis of a deterministic signal model under the MMVs framework.
We show that, by taking the size of signal ensembles into consideration, MMVs indeed exhibit better performance than SMV.
Although our extension can be broadly applied to CS algorithms with MMVs, a case study conducted on a greedy solver, which is commonly known as simultaneous orthogonal matching pursuit (SOMP), will be explored in this paper.
When incorporated with our concept by modifying the steps of support detection and signal estimation, we show that the performance of SOMP will be improved to a meaningful extent, especially for short Euclidean distances between signals.
Performance of the modified SOMP is verified to meet our theoretical prediction.
Moreover, we design a new method based on modified SOMP algorithms for a key application known as cooperative spectrum sensing (CSS).
The simulation results demonstrate that our method can benefit from more than one measurement vector, especially when the length of the measurement vectors is smaller than the sparsity of the signals, which is where traditional CS algorithms fail.
"CSPNet: A New Backbone that can Enhance Learning Capability of CNN," IEEE International Conference on Computer Vision and Pattern Recognition Workshop (CVPRW) on ``Low power computer vision'', June 2020.
Authors: C. Y. Wang, H. Y. Mark Liao, Y. H. Wu, P. Y. Chen, J. W. Hsieh, and I. H. Yeh

MarkLiaoChien YaoWang Abstract:
Neural networks have enabled state-of-the-art approaches to achieve incredible results on computer vision tasks such as object detection. However, such success greatly relies on costly computation resources, which hinders people with cheap devices from appreciating the advanced technology. In this paper, we propose Cross Stage Partial Network (CSPNet) to mitigate the problem that previous works require heavy inference computations from the network architecture perspective. We attribute the problem to the duplicate gradient information within network optimization. The proposed networks respect the variability of the gradients by integrating feature maps from the beginning and the end of a network stage, which, in our experiments, reduces computations by 20% with equivalent or evensuperioraccuracyontheImageNetdataset,andsignificantly outperforms state-of-the-art approaches in terms of AP50 on the MS COCO object detection dataset. The CSPNet is easy to implement and general enough to cope with architectures based on ResNet, ResNeXt, and DenseNet. 
"Difference-Seeking Generative Adversarial Network--Unseen Sample Generation," International Conference on Learning Representations (ICLR), April 2020.
Authors: Yi-Lin Sung, Sung-Hsien Hsieh, Soo-Chang Pei, and Chun-Shien Lu

Chun-ShienLu Abstract:
Unseen data, which are not samples from the distribution of training data and are difficult to collect, have exhibited importance in numerous applications, ({\em e.g.,} novelty detection, semi-supervised learning, and adversarial training). In this paper, we introduce a general framework called \textbf{d}ifference-\textbf{s}eeking \textbf{g}enerative \textbf{a}dversarial \textbf{n}etwork (DSGAN), to generate various types of unseen data. Its novelty is the consideration of the probability density of the unseen data distribution as the difference between two distributions $p_{\bar{d}}$ and $p_{d}$ whose samples are relatively easy to collect.
The DSGAN can learn the target distribution, $p_{t}$, (or the unseen data distribution) from only the samples from the two distributions, $p_{d}$ and $p_{\bar{d}}$. In our scenario, $p_d$ is the distribution of the seen data, and $p_{\bar{d}}$ can be obtained from $p_{d}$ via simple operations, so that we only need the samples of $p_{d}$ during the training.
Two key applications, semi-supervised learning and novelty detection, are taken as case studies to illustrate that the DSGAN enables the production of various unseen data. We also provide theoretical analyses about the convergence of the DSGAN.
Current Research Results
Authors: Hsin-Nan Lin ,Wen-Lian Hsu

Wen-LianHsuHsin-NanLin Abstract:
Background: Personal genomics and comparative genomics are becoming more important in clinical practice and genome research. Both fields require sequence alignment to discover sequence conservation and variation. Though many methods have been developed, some are designed for small genome comparison while some are not efficient for large genome comparison. Moreover, most existing genome comparison tools have not been evaluated the correctness of sequence alignments systematically. A wrong sequence alignment would produce false sequence variants. Results: In this study, we present GSAlign that handles large genome sequence alignment efficiently and identifies sequence variants from the alignment result. GSAlign is an efficient sequence alignment tool for intra-species genomes. It identifies sequence variations from the sequence alignments. We estimate performance by measuring the correctness of predicted sequence variations. The experiment results demonstrated that GSAlign is not only faster than most existing state-of-the-art methods, but also identifies sequence variants with high accuracy. Conclusions: As more genome sequences become available, the demand for genome comparison is increasing. Therefore an efficient and robust algorithm is most desirable. We believe GSAlign can be a useful tool. It exhibits the abilities of ultra-fast alignment as well as high accuracy and sensitivity for detecting sequence variations.
Current Research Results
Authors: Sheng-Yao Su, I-Hsuan Lu, Wen-Chih Cheng, Wei-Chun Chung, Pao-Yang Chen, Jan-Ming Ho, Shu-Hwa Chen, Chung-Yen Lin

Chung-YenLinJan-MingHo Abstract:
To our knowledge, the EpiMOLAS framework, consisting of DocMethyl and EpiMOLAS_web, is the first approach to include containerization technology and a web-based system for WGBS data analysis from raw data processing to downstream analysis. EpiMOLAS will help users cope with their WGBS data and also conduct reproducible analyses of publicly available data, thereby gaining insights into the mechanisms underlying complex biological phenomenon. The Galaxy Docker image DocMethyl is available at https://hub.docker.com/r/lsbnb/docmethyl/. EpiMOLAS_web is publicly accessible at http://symbiosis.iis.sinica.edu.tw/epimolas/.
Current Research Results
Authors: Chiang S., Shinohara H., Huang J.H., Tsai H. K., and Okada M.

Huai-KuangTsai Abstract:
Eukaryotic transcription factors (TFs) coordinate different upstream signals to regulate the target genes. To unveil this network regulation in B cell receptor signaling, we developed a computational pipeline to systematically analyze ERK- and IKK-dependent transcriptome response. We combined a linear regression method and a kinetic modeling to identify the signal-to-TF and TF-to-gene dynamics, respectively, from the time-course experimental data. We show that the combination of TFs differentially controlled by ERK and IKK could contribute divergent expression dynamics in orchestrating the B cell response. Our finding elucidates the regulatory mechanism of the signal-dependent gene expression responsible for eukaryotic cell development.
Current Research Results
"Hardware-Assisted MMU Redirection for In-guest Monitoring and API Profiling," IEEE Transactions on Information Forensics & Security, To Appear.
Authors: Shun-Wen Hsiao, Yeali Sun, Meng Chang Chen

Meng ChangChen Abstract:
With the advance of hardware, network, and virtualization technologies, cloud computing has prevailed and become the target of security threats such as the cross virtual machine (VM) side channel attack, with which malicious users exploit vulnerabilities to gain information or access to other guest virtual machines. Among the many virtualization technologies, the hypervisor manages the shared resource pool to ensure that the guest VMs can be properly served and isolated from each other. However, while managing the shared hardware resources, due to the presence of the virtualization layer and different CPU modes (root and non-root mode), when a CPU is switched to non-root mode and is occupied by a guest machine, a hypervisor cannot intervene with a guest at runtime. Thus, the execution status of a guest is like a black box to a hypervisor, and the hypervisor cannot mediate possible malicious behavior at runtime. To rectify this, we propose a hardware-assisted VMI (virtual machine introspection) based in-guest process monitoring mechanism which supports monitoring and management applications such as process profiling. The mechanism allows hooks placed within a target process (which the security expert selects to monitor and profile) of a guest virtual machine and handles hook invocations via the hypervisor. In order to facilitate the needed monitoring and/or management operations in the guest machine, the mechanism redirects access to in-guest memory space to a controlled, self-defined memory within the hypervisor by modifying the extended page table (EPT) to minimize guest and host machine switches. The advantages of the proposed mechanism include transparency, high performance, and comprehensive semantics. To demonstrate the capability of the proposed mechanism, we develop an API profiling system (APIf) to record the API invocations of the target process. The experimental results show an average performance degradation of about 2.32%, far better than existing similar systems.
"Declarative pearl: deriving monadic Quicksort," Functional and Logic Programming (FLOPS 2020), 2020.
Authors: Shin-Cheng Mu and Tsung-Ju Chiang

Shin-ChengMu Abstract:
To demonstrate derivation of monadic programs, we present a specification of sorting using the non-determinism monad, and derive pure quicksort on lists and state-monadic quicksort on arrays. In the derivation one may switch between point-free and pointwise styles, and deploy techniques familiar to functional programmers such as pattern matching and induction on structures or on sizes. Derivation of stateful programs resembles reasoning backwards from the postcondition.
Current Research Results
"Un-rectifying Non-linear Networks for Signal Representation," IEEE Transactions on Signal Processing, To Appear.
Authors: Wen-Liang Hwang, Andreas Heinecke

Andreas Heinecke Wen-LiangHwang Abstract:
We consider deep neural networks with rectifier activations and max-pooling from a signal representation per- spective. In this view, such representations mark the transition from using a single linear representation for all signals to utilizing a large collection of affine linear representations that are tailored to particular regions of the signal space. We propose a novel technique to “un-rectify” the nonlinear activations into data-dependent linear equations and constraints, from which we derive explicit expressions for the affine linear operators, their domains and ranges in terms of the network parameters. We show how increasing the depth of the network refines the domain partitioning and derive atomic decompositions for the corresponding affine mappings that process data belonging to the same partitioning region. In each atomic decomposition the connections over all hidden network layers are summarized and interpreted in a single matrix. We apply the decompositions to study the Lipschitz regularity of the networks and give sufficient conditions for network-depth-independent stability of the representation, drawing a connection to compressible weight distributions. Such analyses may facilitate and promote further theoretical insight and exchange from both the signal processing and machine learning communities.
"Attractive or Faithful? Popularity-Reinforced Learning for Inspired Headline Generation," the 34th AAAI Conference on Artificial Intelligence (AAAI 2020), February 2020.
Authors: YunZhu Song, Hong-Han Shuai, Sung-Lin Yeh, Yi-Lun Wu, Lun-Wei Ku, Wen-Chih Peng

Lun-WeiKu Image Image Abstract:
With the rapid proliferation of online media sources and pub-lished news, headlines have become increasingly importantfor  attracting  readers  to  news  articles,  since  users  may  beoverwhelmed with the massive information. In this paper, wegenerate inspired headlines that preserve the nature of newsarticles and catch the eye of the reader simultaneously. Thetask of inspired headline generation can be viewed as a specific form of Headline Generation (HG) task, with the em-phasis on creating an attractive headline from a given newsarticle. To generate inspired  headlines,  we propose a novelframework  called  POpularity-Reinforced  Learning  for  in-spired Headline Generation (PORL-HG). PORL-HG exploitsthe extractive-abstractive architecture with 1) Popular TopicAttention (PTA) for guiding the extractor to select the attrac-tive sentence from the article  and 2) a popularity predictorfor guiding the abstractor to rewrite the attractive sentence.Moreover, since the sentence selection of the extractor is notdifferentiable, techniques of reinforcement learning (RL) areutilized to bridge the gap with rewards obtained from a pop-ularity score predictor. Through quantitative and qualitativeexperiments,  we  show  that  the  proposed  PORL-HG  signif-icantly  outperforms  the  state-of-the-art  headline  generationmodels in terms of attractiveness evaluated by both human(71.03%) and the predictor (at least 27.60%), while the faith-fulness of PORL-HG is also comparable to the state-of-the-art generation model.
"Knowledge-Enriched Visual Storytelling," the 34th AAAI Conference on Artificial Intelligence (AAAI 2020), February 2020.
Authors: Chao-Chun Hsu, Zi-Yuan Chen, Chi-Yang Hsu, Chih-Chia Li, Tzu-Yuan Lin, Ting-Hao Huang, Lun-Wei Ku

Lun-WeiKu Abstract:
Stories  are  diverse  and  highly  personalized,  resulting  in  alarge possible output space for story generation. Existing end-to-end approaches produce monotonous stories because theyare limited to the vocabulary and knowledge in a single training dataset. This paper introduces KG-Story, a three-stage framework that allows the story generation model to take advantage of external Knowledge Graphs to produce interesting  stories.  KG-Story  distills  a  set  of  representative  wordsfrom the input prompts, enriches the word set by using external knowledge graphs, and finally generates stories basedon the enriched word set. This distill-enrich-generate framework  allows  the  use  of  external  resources  not  only  for  the enrichment  phase,  but  also  for  the  distillation  and  generation  phases.  In  this  paper,  we  show  the  superiority  of  KG-Story for visual storytelling, where the input prompt is a sequence  of  five  photos  and  the  output  is  a  short  story.  Perthe human ranking evaluation, stories generated by KG-Storyare  on  average  ranked  better  than  that  of  the  state-of-the-art  systems.  Our  code  and  output  stories  are  available  athttps://github.com/zychen423/KE-VIST.
Current Research Results
"A Partial Page Cache Strategy for NVRAM-Based Storage Devices," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), February 2020.
Authors: Shuo-Han Chen, Tseng-Yi Chen, Yuan-Hao Chang, Hsin-Wen Wei, and Wei-Kuan Shih

Yuan-HaoChang Abstract:
Non-volatile random access memory (NVRAM) is becoming a popular alternative as the memory and storage medium in battery-powered embedded systems because of its fast read/write performance, byte-addressability, and non-volatility. A well-known example is phase-change memory (PCM) that has much longer life expectancy and faster access performance than NAND flash. When NVRAM is considered as both main memory and storage in battery-powered embedded systems, existing page cache mechanisms have too many unnecessary data movements between main memory and storage. To tackle this issue, we propose the concept of 'union page cache,' to jointly manage data of the page cache in both main memory and storage. To realize this concept, we design a partial page cache strategy that considers both main memory and storage as its management space. This strategy can eliminate unnecessary data movements between main memory and storage without sacrificing the data \textbf{integrity} of file systems. A series of experiments was conducted on an embedded platform. The results show that the proposed strategy can improve the file accessing performance up to 85.62% when PCM used as a case study.
"Why Attention? Analyze BiLSTM Deficiency and Its Remedies in the Case of NER," the 34th AAAI Conference on Artificial Intelligence (AAAI 2020), February 2020.
Authors: Peng-Hsuan Li, Tsu-Jui Fu, Wei-Yun Ma

Wei-YunMa Wei-YunMa Wei-YunMa Abstract:
BiLSTM has been prevalently used as a core module for NER in a sequence-labeling setup. State-of-the-art approaches use BiLSTM with additional resources such as gazetteers, language-modeling, or multi-task supervision to further improve NER. This paper instead takes a step back and focuses on analyzing problems of BiLSTM itself and how exactly self-attention can bring improvements.We formally show the limitation of (CRF-)BiLSTM in modeling cross-context patterns for each word – the XOR limitation. Then, we show that two types of simple cross-structures – self-attention and Cross-BiLSTM – can effectively remedy the problem. We test the practical impacts of the deficiency on real-world NER datasets, OntoNotes 5.0 and WNUT 2017, with clear and consistent improvements over the baseline, up to 8.7% on some of the multi-token entity mentions. We give in-depth analyses of the improvements across several aspects of NER, especially the identification of multi-token mentions. This study should lay a sound foundation for future improvements on sequence-labeling NER.
"Relation Extraction Exploiting Full Dependency Forests," the 34th AAAI Conference on Artificial Intelligence (AAAI 2020), February 2020.
Authors: Lifeng Jin, Linfeng Song, Yue Zhang, Kun Xu, Wei-Yun Ma, Dong Yu

Wei-YunMa Abstract:
Dependency syntax has long been recognized as a crucial source of features for relation extraction. Previous work considers 1-best trees produced by a parser during preprocessing. However, error propagation from the out-of-domain parser may impact the relation extraction performance. We propose to leverage full dependency forests for this task, where a full dependency forest encodes all possible trees. Such representations of full dependency forests provide a differentiable connection between a parser and a relation extraction model, and thus we are also able to study adjusting the parser parameters based on end-task loss. Experiments on three datasets show that full dependency forests and parser adjustment give significant improvements over carefully designed baselines, showing state-of-the-art or competitive performances on biomedical or newswire benchmarks.
"Query-Driven Multi-Instance Learning," Thirty-Fourth AAAI Conference on Artificial Intelligence, February 2020, February 2020.
Authors: Yen-Chi Hsu, Cheng-Yao Hong, Ming-Sui Lee, and Tyng-Luh Liu

Tyng-LuhLiu Abstract:
We introduce a query-driven approach (qMIL) to multi-instance learning where the queries aim to uncover the class labels embodied in a given bag of instances. Specifically, it solves a multi-instance multi-label learning (MIML) problem with a more challenging setting than the conventional one. Each MIML bag in our formulation is annotated only with a binary label indicating whether the bag contains the instance of a certain class and the query is specified by the word2vec of a class label/name. To learn a deep-net model for qMIL, we construct a network component that achieves a generalized compatibility measure for query-visual co-embedding and yields proper instance attentions to the given query. The bag representation is then formed as the attention-weighted sum of the instances' weights, and passed to the classification layer at the end of the network. In addition, the qMIL formulation is flexible for extending the network to classify unseen class labels, leading to a new technique to solve the zero-shot MIML task through an iterative querying process. Experimental results on action classification over video clips and three MIML datasets from MNIST, CIFAR10 and Scene are provided to demonstrate the effectiveness of our method.

相關資訊

Academia Sinica 資訊科學研究所 Academia Sinica