
Hyukkyu Kang
I am a Ph.D. Candidate in the Data Systems Lab at Pohang University of Science and Technology (POSTECH). I am doing research under the supervision of Professor Wook-Shin Han. My research interests are in the area of Natural Language Processing (NLP) and Information Retrieval (IR). I got my B.S. degree in Computer Science and Engineering from POSTECH.
News
Aug. 2025
One paper was accepted to EMNLP 2025 (Main Conference).
Jan. 2025
Visiting Scholar at Global AI Frontier Lab, New York University
Education
B.S. in Computer Science and Engineering
Pohang University of Science and Technology (POSTECH)
Work Experience
Visiting Scholar
Global AI Frontier Lab, New York University
- Collaborated with Prof. Kyunghyun Cho on "Disentangling Reasoning and Knowledge in Retrieval-Augmented Language Models."
Research Intern
Database Lab, POSTECH
- Researched Natural Language Interface to Databases (NLIDB).
Research Intern
Center of Netmarble AI Revolution, Netmarble Company
- Developed AI player for a real-time strategy game using reinforcement learning.
Publications
TRIAL: Token Relations and Importance Aware Late-interaction for Accurate Text Retrieval
Projects
AI Guardians: Development of Robust, Controllable, and Unbiased Trustworthy AI Technology
IITP (Korea government MSIT), Global AI Frontier Lab (No. RS-2024-00509258)
- Developing RAQUEL: Robust Validation of Machine Unlearning through Query Executions over an Aligned Database.
Knowledge Graph Construction for Knowledge Inference
Samsung SDS
- Developed an end-to-end system to construct knowledge graphs from raw document corpora, structuring domain knowledge for downstream applications.
Development of a Conversational, Self-tuning DBMS
IITP (Korea government MSIT) (No. 2018-0-01398)
- Built a deep learning–based text-to-SQL semantic parser for natural-language interfaces to DBMS.
Activities
Global Leadership Program (GLP), Computer Vision Lab, POSTECH
- Researched real-time object detection and tracking.
POSTECH Laboratory for Unix Security (PLUS)
- Studied Linux system vulnerabilities; participated in CTFs (e.g., DEFCON CTF 2017).