Soonyoung Jung

Soonyoung Jung
  • Korea University

About

29
Publications
4,709
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
141
Citations
Current institution
Korea University

Publications

Publications (29)
Preprint
Full-text available
Conditioned source separations have attracted significant attention because of their flexibility, applicability and extensionality. Their performance was usually inferior to the existing approaches, such as the single source separation model. However, a recently proposed method called LaSAFT-Net has shown that conditioned models can show comparable...
Preprint
Full-text available
Recently, many methods based on deep learning have been proposed for music source separation. Some state-of-the-art methods have shown that stacking many layers with many skip connections improve the SDR performance. Although such a deep and complex architecture shows outstanding performance, it usually requires numerous computing resources and tim...
Preprint
Full-text available
This paper proposes a neural network that performs audio transformations to user-specified sources (e.g., vocals) of a given audio track according to a given description while preserving other sources not mentioned in the description. Audio Manipulation on a Specific Source (AMSS) is challenging because a sound object (i.e., a waveform sample or fr...
Preprint
Full-text available
Recent deep-learning approaches have shown that Frequency Transformation (FT) blocks can significantly improve spectrogram-based single-source separation models by capturing frequency patterns. The goal of this paper is to extend the FT block to fit the multi-source task. We propose the Latent Source Attentive Frequency Transformation (LaSAFT) bloc...
Preprint
Full-text available
Singing Voice Separation (SVS) tries to separate singing voice from a given mixed musical signal. Recently, many U-Net-based models have been proposed for the SVS task, but there were no existing works that evaluate and compare various types of intermediate blocks that can be used in the U-Net architecture. In this paper, we introduce a variety of...
Chapter
We consider an application scenario where user want to find regions that have similar tendency about a certain issue, e.g., looking for regions that are neutral to new welfare policies. Motivated by this, we present a novel query to retrieve regions with similar tendency, named ρ-Dense Region Query (ρ-DR Query), that returns arbitrary shape of regi...
Article
Named entities in the biomedical domain are often written using a Noun Phrase (NP) along with a coordinating conjunction such as such as 'and' and 'or'. In addition, repeated words among named entity mentions are frequently omitted. It is often difficult to identify named entities. Although various Named Entity Recognition (NER) methods have tried...
Article
Full-text available
Web search users complain of the inaccurate results produced by current search engines. Most of these inaccurate results are due to a failure to understand the user’s search goal. This paper proposes a method to extract users’ intentions and to build an intention map representing these extracted intentions. The proposed method makes intention vecto...
Article
Digital content is easy to reproduce and manipulate. It is difficult to distinguish the original content from pirated copies. A cryptographic method is needed to protect content author’s ownership and secure content distribution. The method should be extended to the case of multiple authors since the content is completed with the assistance of many...
Article
This paper proposes a novel of a personalized Computer Assisted Language Learning (CALL) system based on learner's cognitive abilities related to foreign language proficiency. In this CALL system, a strategy of retrieval learning, a method of learning memory cycle, and a method of repeated learning are applied for effective vocabulary memorization....
Article
Web search users complain of inaccurate results of the current search engines. Most of inaccurate results are from failing to understand user's search goal. This paper proposes a method to mine user's intentions and to build an intention map representing their information needs. It selects intention features from search logs obtained from previous...
Article
This paper proposes a computational lexical entry acquisition model based on a representation model of the mental lexicon. The proposed model acquires lexical entries from a raw corpus by unsupervised learning like human. The model is composed of full-form and morpheme acquisition modules. In the full-from acquisition module, core full-forms are au...
Article
Hybrid Peer-to-Peer (P2P) systems that construct overlay networks structured among superpeers have great potential in that they can give the benefits such as scalability, search speed and network traffic, taking advantages of superpeer-based and the structured P2P systems. In this article, we enhance keyword search in hybrid P2P systems by construc...
Conference Paper
This paper proposes a Computer Assisted Language Learning(CALL) system, the English Brain Enhancement System, in which is applied the brain scientific principles of human language processing for effective English learning. It is designed to offer adaptive learning based on the cognitive abilities related human language processing. For this, the sys...
Conference Paper
As a solution for malicious Web page attacks, we need a client-side prevention system with deobfuscation mechanism. In this paper we introduce WebVaccine, that is a client-side real-time prevention system against obfuscated malicious Web pages. For secure web surfing, before the navigation to be completed, WebVaccine inserts a deobfuscation functio...
Conference Paper
This study is intended to design and implement an automatic lexical acquisition model based on cognitive neuroscience referring to the theory that mental lexicon structure is represented with full-listing and morphemic and that lexical forms accessed to mental lexicon upon word cognition takes a hybrid type. As the result of the study, we could sim...
Article
The HLA control a variety of function involved in immune response and influence susceptibility to over 40 diseases. It is important to find out how HLA cause the disease or modify susceptibility or course of it. In this paper, we developed an automatic HLA-disease information extraction procedure that uses biomedical publications. First, HLA and di...
Conference Paper
The HLA control a variety of function involved in immune response and influence susceptibility to over 40 diseases. It is important to find out how HLA cause the disease or modify susceptibility or course of it. In this paper, we developed an automatic HLA-disease information extraction procedure that uses biomedical publications. First, HLA and di...
Conference Paper
To facilitate power saving via wireless data broadcast, index information is typically broadcast along with the data. By first accessing the broadcast index, the mobile client is able to predict the arrival time of the desired data. However, it suffers from the drawback that the client has to wait and tune for an index segment, in order to conserve...
Conference Paper
Full-text available
In this paper, we investigate whether the word frequency effect and the word similarity effect could be applied to Korean lexical decision task (henceforth, LDT). Also we propose a computational model of Korean LDT and present comparison results between human and computational model on Korean LDT. We found that the word frequency effect and the sim...
Conference Paper
Full-text available
A peer-to-peer grid computing is complicated by heterogeneous capabilities, failures, volatility, and lack of trust because it is based on desktop computers at the edge of the Internet. In order to improve the reliability of computation and gain better performance, a replication mechanism must adapt to these distinct features. In other words, it is...
Article
Full-text available
Peer-to-peer grid computing is an attractive computing paradigm for high throughput applications. However, both volatility Peer-to-peer grid computing is an attractive computing paradigm for high throughput applications. However, both volatility due to the autonomy of volunteers (i.e., resource providers) and the heterogeneous properties of volunte...
Conference Paper
In this paper, we investigate whether the word frequency effect and the word similarity effect could be applied to Korean lexical decision task (henceforth, LDT). Also we propose a computational model of Korean LDT and present comparison results between human and computational model on Korean LDT. We found that the word frequency effect and the sim...
Conference Paper
Location-aware mobile services(LAMSs) are characterized by a large number of objects and a large number of queries. Moreover, with a large candidate data set, answering LAMSs via scanning through the whole data set becomes extremely expensive. In broadcast-based services, any number of clients can monitor the broadcast channel and retrieve the data...
Conference Paper
In a peer to peer grid computing environment, volunteers have heterogeneous properties and dynamically join and leave during execution. Therefore, it is essential to adapt to an unstable and widely distributed environment. However, existing scheduling and result certification mechanisms do not adapt to such a dynamic environment. As a result, they...
Conference Paper
Indexing techniques have been developed for wireless data broadcast environments, in order to conserve the scarce power resources of the mobile clients. However, the use of interleaved index segments in a broadcast cycle increases the average access latency for the clients. In this paper, we present the broadcast-based spatial query processing algo...
Conference Paper
The paper proposes a new conflict relation called preservation. By explicitly including reverse-operations, preservation can be used independently of execution contexts to which different recovery algorithms and/or object models give rise. The paper also makes a two-dimensional (i.e., execution contexts and operations' specifications) comparison be...

Network

Cited By