-
Power Optimization and Deep Learning for Channel Estimation of Active IRS-Aided IoT
Authors:
Yan Wang,
Wei Gao,
Qi Zhang,
Jiajia Liu,
Feng Shu
Abstract:
In this paper, channel estimation of an active intelligent reflecting surface (IRS) aided uplink Internet of Things (IoT) network is investigated. Firstly, the least square (LS) estimators for the direct channel and the cascaded channel are presented, respectively. The corresponding mean square errors (MSE) of channel estimators are derived. Subsequently, in order to evaluate the influence of adju…
▽ More
In this paper, channel estimation of an active intelligent reflecting surface (IRS) aided uplink Internet of Things (IoT) network is investigated. Firstly, the least square (LS) estimators for the direct channel and the cascaded channel are presented, respectively. The corresponding mean square errors (MSE) of channel estimators are derived. Subsequently, in order to evaluate the influence of adjusting the transmit power at the IoT devices or the reflected power at the active IRS on Sum-MSE performance, two situations are considered. In the first case, under the total power sum constraint of the IoT devices and active IRS, the closed-form expression of the optimal power allocation factor is derived. In the second case, when the transmit power at the IoT devices is fixed, there exists an optimal reflective power at active IRS. To further improve the estimation performance, the convolutional neural network (CNN)-based direct channel estimation (CDCE) algorithm and the CNN-based cascaded channel estimation (CCCE) algorithm are designed. Finally, simulation results demonstrate the existence of an optimal power allocation strategy that minimizes the Sum-MSE, and further validate the superiority of the proposed CDCE / CCCE algorithms over their respective traditional LS and minimum mean square error (MMSE) baselines.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property Reasoning
Authors:
Yinbo Yu,
Yuanqi Xu,
Kepu Huang,
Jiajia Liu
Abstract:
Trigger-Action Programming (TAP) is a popular end-user programming framework in the home automation (HA) system, which eases users to customize home automation and control devices as expected. However, its simplified syntax also introduces new safety threats to HA systems through vulnerable rule interactions. Accurately fixing these vulnerabilities by logically and physically eliminating their roo…
▽ More
Trigger-Action Programming (TAP) is a popular end-user programming framework in the home automation (HA) system, which eases users to customize home automation and control devices as expected. However, its simplified syntax also introduces new safety threats to HA systems through vulnerable rule interactions. Accurately fixing these vulnerabilities by logically and physically eliminating their root causes is essential before rules are deployed. However, it has not been well studied. In this paper, we present TAPFixer, a novel framework to automatically detect and repair rule interaction vulnerabilities in HA systems. It extracts TAP rules from HA profiles, translates them into an automaton model with physical and latency features, and performs model checking with various correctness properties. It then uses a novel negated-property reasoning algorithm to automatically infer a patch via model abstraction and refinement and model checking based on negated-properties. We evaluate TAPFixer on market HA apps (1177 TAP rules and 53 properties) and find that it can achieve an 86.65% success rate in repairing rule interaction vulnerabilities. We additionally recruit 23 HA users to conduct a user study that demonstrates the usefulness of TAPFixer for vulnerability repair in practical HA scenarios.
△ Less
Submitted 12 July, 2024;
originally announced July 2024.
-
Detect Llama -- Finding Vulnerabilities in Smart Contracts using Large Language Models
Authors:
Peter Ince,
Xiapu Luo,
Jiangshan Yu,
Joseph K. Liu,
Xiaoning Du
Abstract:
In this paper, we test the hypothesis that although OpenAI's GPT-4 performs well generally, we can fine-tune open-source models to outperform GPT-4 in smart contract vulnerability detection. We fine-tune two models from Meta's Code Llama and a dataset of 17k prompts, Detect Llama - Foundation and Detect Llama - Instruct, and we also fine-tune OpenAI's GPT-3.5 Turbo model (GPT-3.5FT). We then evalu…
▽ More
In this paper, we test the hypothesis that although OpenAI's GPT-4 performs well generally, we can fine-tune open-source models to outperform GPT-4 in smart contract vulnerability detection. We fine-tune two models from Meta's Code Llama and a dataset of 17k prompts, Detect Llama - Foundation and Detect Llama - Instruct, and we also fine-tune OpenAI's GPT-3.5 Turbo model (GPT-3.5FT). We then evaluate these models, plus a random baseline, on a testset we develop against GPT-4, and GPT-4 Turbo's, detection of eight vulnerabilities from the dataset and the two top identified vulnerabilities - and their weighted F1 scores.
We find that for binary classification (i.e., is this smart contract vulnerable?), our two best-performing models, GPT-3.5FT and Detect Llama - Foundation, achieve F1 scores of $0.776$ and $0.68$, outperforming both GPT-4 and GPT-4 Turbo, $0.66$ and $0.675$. For the evaluation against individual vulnerability identification, our top two models, GPT-3.5FT and Detect Llama - Foundation, both significantly outperformed GPT-4 and GPT-4 Turbo in both weighted F1 for all vulnerabilities ($0.61$ and $0.56$ respectively against GPT-4's $0.218$ and GPT-4 Turbo's $0.243$) and weighted F1 for the top two identified vulnerabilities ($0.719$ for GPT-3.5FT, $0.674$ for Detect Llama - Foundation against GPT-4's $0.363$ and GPT-4 Turbo's $0.429$).
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Domain-Hierarchy Adaptation via Chain of Iterative Reasoning for Few-shot Hierarchical Text Classification
Authors:
Ke Ji,
Peng Wang,
Wenjun Ke,
Guozheng Li,
Jiajun Liu,
Jingsheng Gao,
Ziyu Shang
Abstract:
Recently, various pre-trained language models (PLMs) have been proposed to prove their impressive performances on a wide range of few-shot tasks. However, limited by the unstructured prior knowledge in PLMs, it is difficult to maintain consistent performance on complex structured scenarios, such as hierarchical text classification (HTC), especially when the downstream data is extremely scarce. The…
▽ More
Recently, various pre-trained language models (PLMs) have been proposed to prove their impressive performances on a wide range of few-shot tasks. However, limited by the unstructured prior knowledge in PLMs, it is difficult to maintain consistent performance on complex structured scenarios, such as hierarchical text classification (HTC), especially when the downstream data is extremely scarce. The main challenge is how to transfer the unstructured semantic space in PLMs to the downstream domain hierarchy. Unlike previous work on HTC which directly performs multi-label classification or uses graph neural network (GNN) to inject label hierarchy, in this work, we study the HTC problem under a few-shot setting to adapt knowledge in PLMs from an unstructured manner to the downstream hierarchy. Technically, we design a simple yet effective method named Hierarchical Iterative Conditional Random Field (HierICRF) to search the most domain-challenging directions and exquisitely crafts domain-hierarchy adaptation as a hierarchical iterative language modeling problem, and then it encourages the model to make hierarchical consistency self-correction during the inference, thereby achieving knowledge transfer with hierarchical consistency preservation. We perform HierICRF on various architectures, and extensive experiments on two popular HTC datasets demonstrate that prompt with HierICRF significantly boosts the few-shot HTC performance with an average Micro-F1 by 28.80% to 1.50% and Macro-F1 by 36.29% to 1.5% over the previous state-of-the-art (SOTA) baselines under few-shot settings, while remaining SOTA hierarchical consistency performance.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Exploring Knowledge Transfer in Evolutionary Many-task Optimization: A Complex Network Perspective
Authors:
Yudong Yang,
Kai Wu,
Xiangyi Teng,
Handing Wang,
He Yu,
Jing Liu
Abstract:
The field of evolutionary many-task optimization (EMaTO) is increasingly recognized for its ability to streamline the resolution of optimization challenges with repetitive characteristics, thereby conserving computational resources. This paper tackles the challenge of crafting efficient knowledge transfer mechanisms within EMaTO, a task complicated by the computational demands of individual task e…
▽ More
The field of evolutionary many-task optimization (EMaTO) is increasingly recognized for its ability to streamline the resolution of optimization challenges with repetitive characteristics, thereby conserving computational resources. This paper tackles the challenge of crafting efficient knowledge transfer mechanisms within EMaTO, a task complicated by the computational demands of individual task evaluations. We introduce a novel framework that employs a complex network to comprehensively analyze the dynamics of knowledge transfer between tasks within EMaTO. By extracting and scrutinizing the knowledge transfer network from existing EMaTO algorithms, we evaluate the influence of network modifications on overall algorithmic efficacy. Our findings indicate that these networks are diverse, displaying community-structured directed graph characteristics, with their network density adapting to different task sets. This research underscores the viability of integrating complex network concepts into EMaTO to refine knowledge transfer processes, paving the way for future advancements in the domain.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
MAVIS: Mathematical Visual Instruction Tuning
Authors:
Renrui Zhang,
Xinyu Wei,
Dongzhi Jiang,
Yichi Zhang,
Ziyu Guo,
Chengzhuo Tong,
Jiaming Liu,
Aojun Zhou,
Bin Wei,
Shanghang Zhang,
Peng Gao,
Hongsheng Li
Abstract:
Multi-modal Large Language Models (MLLMs) have recently emerged as a significant focus in academia and industry. Despite their proficiency in general multi-modal scenarios, the mathematical problem-solving capabilities in visual contexts remain insufficiently explored. We identify three key areas within MLLMs that need to be improved: visual encoding of math diagrams, diagram-language alignment, a…
▽ More
Multi-modal Large Language Models (MLLMs) have recently emerged as a significant focus in academia and industry. Despite their proficiency in general multi-modal scenarios, the mathematical problem-solving capabilities in visual contexts remain insufficiently explored. We identify three key areas within MLLMs that need to be improved: visual encoding of math diagrams, diagram-language alignment, and mathematical reasoning skills. This draws forth an urgent demand for large-scale, high-quality data and training pipelines in visual mathematics. In this paper, we propose MAVIS, the first MAthematical VISual instruction tuning paradigm for MLLMs, involving a series of mathematical visual datasets and specialized MLLMs. Targeting the three issues, MAVIS contains three progressive training stages from scratch. First, we curate MAVIS-Caption, consisting of 558K diagram-caption pairs, to fine-tune a math-specific vision encoder (CLIP-Math) through contrastive learning, tailored for improved diagram visual encoding. Second, we utilize MAVIS-Caption to align the CLIP-Math with a large language model (LLM) by a projection layer, enhancing vision-language alignment in mathematical domains. Third, we introduce MAVIS-Instruct, including 900K meticulously collected and annotated visual math problems, which is adopted to finally instruct-tune the MLLM for robust mathematical reasoning skills. In MAVIS-Instruct, we incorporate complete chain-of-thought (CoT) rationales for each problem, and minimize textual redundancy, thereby concentrating the model towards the visual elements. Data and Models are released at https://github.com/ZrrSkywalker/MAVIS
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
On the Universal Truthfulness Hyperplane Inside LLMs
Authors:
Junteng Liu,
Shiqi Chen,
Yu Cheng,
Junxian He
Abstract:
While large language models (LLMs) have demonstrated remarkable abilities across various fields, hallucination remains a significant challenge. Recent studies have explored hallucinations through the lens of internal representations, proposing mechanisms to decipher LLMs' adherence to facts. However, these approaches often fail to generalize to out-of-distribution data, leading to concerns about w…
▽ More
While large language models (LLMs) have demonstrated remarkable abilities across various fields, hallucination remains a significant challenge. Recent studies have explored hallucinations through the lens of internal representations, proposing mechanisms to decipher LLMs' adherence to facts. However, these approaches often fail to generalize to out-of-distribution data, leading to concerns about whether internal representation patterns reflect fundamental factual awareness, or only overfit spurious correlations on the specific datasets. In this work, we investigate whether a universal truthfulness hyperplane that distinguishes the model's factually correct and incorrect outputs exists within the model. To this end, we scale up the number of training datasets and conduct an extensive evaluation -- we train the truthfulness hyperplane on a diverse collection of over 40 datasets and examine its cross-task, cross-domain, and in-domain generalization. Our results indicate that increasing the diversity of the training datasets significantly enhances the performance in all scenarios, while the volume of data samples plays a less critical role. This finding supports the optimistic hypothesis that a universal truthfulness hyperplane may indeed exist within the model, offering promising directions for future research.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models
Authors:
Ying Zhang,
Xiaoyan Zhou,
Hui Wen,
Wenjia Niu,
Jiqiang Liu,
Haining Wang,
Qiang Li
Abstract:
Nowadays, the open-source software (OSS) ecosystem suffers from security threats of software supply chain (SSC) attacks. Interpreted OSS malware plays a vital role in SSC attacks, as criminals have an arsenal of attack vectors to deceive users into installing malware and executing malicious activities. In this paper, we introduce tactics, techniques, and procedures (TTPs) proposed by MITRE ATT\&CK…
▽ More
Nowadays, the open-source software (OSS) ecosystem suffers from security threats of software supply chain (SSC) attacks. Interpreted OSS malware plays a vital role in SSC attacks, as criminals have an arsenal of attack vectors to deceive users into installing malware and executing malicious activities. In this paper, we introduce tactics, techniques, and procedures (TTPs) proposed by MITRE ATT\&CK into the interpreted malware analysis to characterize different phases of an attack lifecycle. Specifically, we propose GENTTP, a zero-shot approach to extracting a TTP of an interpreted malware package. GENTTP leverages large language models (LLMs) to automatically generate a TTP, where the input is a malicious package, and the output is a deceptive tactic and an execution tactic of attack vectors. To validate the effectiveness of GENTTP, we collect two datasets for evaluation: a dataset with ground truth labels and a large dataset in the wild. Experimental results show that GENTTP can generate TTPs with high accuracy and efficiency. To demonstrate GENTTP's benefits, we build an LLM-based Chatbot from 3,700+ PyPI malware's TTPs. We further conduct a quantitative analysis of malware's TTPs at a large scale. Our main findings include: (1) many OSS malicious packages share a relatively stable TTP, even with the increasing emergence of malware and attack campaigns, (2) a TTP reflects characteristics of a malware-based attack, and (3) an attacker's intent behind the malware is linked to a TTP.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Charged spherically symmetric and slowly rotating charged black hole solutions in bumblebee gravity
Authors:
Jia-Zhou Liu,
Wen-Di Guo,
Shao-Wen Wei,
Yu-Xiao Liu
Abstract:
In this paper, we present charged spherically symmetric black hole solutions and slowly rotating charged solutions in bumblebee gravity with and without a cosmological constant. The static spherically symmetric solutions describe the Reissner-Nordström-like black hole and ReissnerNordström-(anti) de Sitter-like black hole, while the stationary and axially symmetric soltuions describe Kerr-Newman-l…
▽ More
In this paper, we present charged spherically symmetric black hole solutions and slowly rotating charged solutions in bumblebee gravity with and without a cosmological constant. The static spherically symmetric solutions describe the Reissner-Nordström-like black hole and ReissnerNordström-(anti) de Sitter-like black hole, while the stationary and axially symmetric soltuions describe Kerr-Newman-like black hole and Kerr-Newman-(anti) de Sitter-like black hole. We utilize the Hamilton-Jacobi formalism to study the shadows of the black holes. Additionally, we investigate the effect of the electric charge and Lorentz-violating parameters on the radius of the shadow reference circle and the distortion parameter. We find that the radius of the reference circle decreases with the Lorentz-violating parameter and charge parameter, while the distortion parameter increases with the Lorentz-violating parameter and the charge parameter.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Diff-Tracker: Text-to-Image Diffusion Models are Unsupervised Trackers
Authors:
Zhengbo Zhang,
Li Xu,
Duo Peng,
Hossein Rahmani,
Jun Liu
Abstract:
We introduce Diff-Tracker, a novel approach for the challenging unsupervised visual tracking task leveraging the pre-trained text-to-image diffusion model. Our main idea is to leverage the rich knowledge encapsulated within the pre-trained diffusion model, such as the understanding of image semantics and structural information, to address unsupervised visual tracking. To this end, we design an ini…
▽ More
We introduce Diff-Tracker, a novel approach for the challenging unsupervised visual tracking task leveraging the pre-trained text-to-image diffusion model. Our main idea is to leverage the rich knowledge encapsulated within the pre-trained diffusion model, such as the understanding of image semantics and structural information, to address unsupervised visual tracking. To this end, we design an initial prompt learner to enable the diffusion model to recognize the tracking target by learning a prompt representing the target. Furthermore, to facilitate dynamic adaptation of the prompt to the target's movements, we propose an online prompt updater. Extensive experiments on five benchmark datasets demonstrate the effectiveness of our proposed method, which also achieves state-of-the-art performance.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Enhancing Thermal Infrared Tracking with Natural Language Modeling and Coordinate Sequence Generation
Authors:
Miao Yan,
Ping Zhang,
Haofei Zhang,
Ruqian Hao,
Juanxiu Liu,
Xiaoyang Wang,
Lin Liu
Abstract:
Thermal infrared tracking is an essential topic in computer vision tasks because of its advantage of all-weather imaging. However, most conventional methods utilize only hand-crafted features, while deep learning-based correlation filtering methods are limited by simple correlation operations. Transformer-based methods ignore temporal and coordinate information, which is critical for TIR tracking…
▽ More
Thermal infrared tracking is an essential topic in computer vision tasks because of its advantage of all-weather imaging. However, most conventional methods utilize only hand-crafted features, while deep learning-based correlation filtering methods are limited by simple correlation operations. Transformer-based methods ignore temporal and coordinate information, which is critical for TIR tracking that lacks texture and color information. In this paper, to address these issues, we apply natural language modeling to TIR tracking and propose a novel model called NLMTrack, which enhances the utilization of coordinate and temporal information. NLMTrack applies an encoder that unifies feature extraction and feature fusion, which simplifies the TIR tracking pipeline. To address the challenge of low detail and low contrast in TIR images, on the one hand, we design a multi-level progressive fusion module that enhances the semantic representation and incorporates multi-scale features. On the other hand, the decoder combines the TIR features and the coordinate sequence features using a causal transformer to generate the target sequence step by step. Moreover, we explore an adaptive loss aimed at elevating tracking accuracy and a simple template update strategy to accommodate the target's appearance variations. Experiments show that NLMTrack achieves state-of-the-art performance on multiple benchmarks. The Code is publicly available at \url{https://github.com/ELOESZHANG/NLMTrack}.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Bayesian uncertainty analysis for underwater 3D reconstruction with neural radiance fields
Authors:
Haojie Lian,
Xinhao Li,
Yilin Qu,
Jing Du,
Zhuxuan Meng,
Jie Liu,
Leilei Chen
Abstract:
Neural radiance fields (NeRFs) are a deep learning technique that can generate novel views of 3D scenes using sparse 2D images from different viewing directions and camera poses. As an extension of conventional NeRFs in underwater environment, where light can get absorbed and scattered by water, SeaThru-NeRF was proposed to separate the clean appearance and geometric structure of underwater scene…
▽ More
Neural radiance fields (NeRFs) are a deep learning technique that can generate novel views of 3D scenes using sparse 2D images from different viewing directions and camera poses. As an extension of conventional NeRFs in underwater environment, where light can get absorbed and scattered by water, SeaThru-NeRF was proposed to separate the clean appearance and geometric structure of underwater scene from the effects of the scattering medium. Since the quality of the appearance and structure of underwater scenes is crucial for downstream tasks such as underwater infrastructure inspection, the reliability of the 3D reconstruction model should be considered and evaluated. Nonetheless, owing to the lack of ability to quantify uncertainty in 3D reconstruction of underwater scenes under natural ambient illumination, the practical deployment of NeRFs in unmanned autonomous underwater navigation is limited. To address this issue, we introduce a spatial perturbation field D_omega based on Bayes' rays in SeaThru-NeRF and perform Laplace approximation to obtain a Gaussian distribution N(0,Sigma) of the parameters omega, where the diagonal elements of Sigma correspond to the uncertainty at each spatial location. We also employ a simple thresholding method to remove artifacts from the rendered results of underwater scenes. Numerical experiments are provided to demonstrate the effectiveness of this approach.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Spectroastrometry and Reverberation Mapping (SARM) of Active Galactic Nuclei. I. The H$β$ Broad-line Region Structure and Black Hole Mass of Five Quasars
Authors:
Yan-Rong Li,
Chen Hu,
Zhu-Heng Yao,
Yong-Jie Chen,
Hua-Rui Bai,
Sen Yang,
Pu Du,
Feng-Na Fang,
Yi-Xin Fu,
Jun-Rong Liu,
Yue-Chang Peng,
Yu-Yang Songsheng,
Yi-Lin Wang,
Ming Xiao,
Shuo Zhai,
Hartmut Winkler,
Jin-Ming Bai,
Luis C. Ho,
Romain G. Petrov,
Jesus Aceituno,
Jian-Min Wang
Abstract:
We conduct a reverberation mapping (RM) campaign to spectroscopically monitor a sample of selected bright active galactic nuclei with large anticipated broad-line region (BLR) sizes adequate for spectroastrometric observations by the GRAVITY instrument on the Very Large Telescope Interferometer. We report the first results for five objects, IC 4329A, Mrk 335, Mrk 509, Mrk 1239, and PDS 456, among…
▽ More
We conduct a reverberation mapping (RM) campaign to spectroscopically monitor a sample of selected bright active galactic nuclei with large anticipated broad-line region (BLR) sizes adequate for spectroastrometric observations by the GRAVITY instrument on the Very Large Telescope Interferometer. We report the first results for five objects, IC 4329A, Mrk 335, Mrk 509, Mrk 1239, and PDS 456, among which Mrk 1239 and PDS 456 are for the first time spectroscopically monitored. We obtain multi-year monitoring data and perform multi-component spectral decomposition to extract the broad H$β$ profiles. We detect significant time lags between the H$β$ and continuum variations, generally obeying the previously established BLR size-luminosity relation. Velocity-resolved H$β$ time lags illustrate diverse, possibly evolving BLR kinematics. We further measure the H$β$ line widths from mean and rms spectra and the resulting virial products show good consistency among different seasons. Adopting a unity virial factor and the full width at half maximum of the broad H$β$ line from the mean spectrum as the measure of velocity, the obtained black hole mass averaged over seasons is $\log M_\bullet/M_\odot=8.02_{-0.14}^{+0.09}$, $6.92_{-0.12}^{+0.12}$, $8.01_{-0.25}^{+0.16}$, $7.44_{-0.14}^{+0.13}$, and $8.59_{-0.11}^{+0.07}$ for the five objects, respectively. The black hole mass estimations using other line width measures are also reported (up to the virial factors). For objects with previous RM campaigns, our mass estimates are in agreement with earlier results. In a companion paper, we will employ BLR dynamical modeling to directly infer the black hole mass and thereby determine the virial factors.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Improving the Automated Coronal Jet Identification with U-NET
Authors:
Jiajia Liu,
Chunyu Ji,
Yimin Wang,
Szabolcs Soós,
Ye Jiang,
Robertus Erdélyi,
M. B. Korsós,
Yuming Wang
Abstract:
Coronal jets are one of the most common eruptive activities in the solar atmosphere. They are related to rich physics processes, including but not limited to magnetic reconnection, flaring, instabilities, and plasma heating. Automated identification of off-limb coronal jets has been difficult due to their abundant nature, complex appearance, and relatively small size compared to other features in…
▽ More
Coronal jets are one of the most common eruptive activities in the solar atmosphere. They are related to rich physics processes, including but not limited to magnetic reconnection, flaring, instabilities, and plasma heating. Automated identification of off-limb coronal jets has been difficult due to their abundant nature, complex appearance, and relatively small size compared to other features in the corona. In this paper, we present an automated coronal jet identification algorithm (AJIA) that utilizes true and fake jets previously detected by a laborious semi-automated jet detection algorithm (SAJIA, Liu et al. 2023) as the input of an image segmentation neural network U-NET. It is found that AJIA could achieve a much higher (0.81) detecting precision than SAJIA (0.34), meanwhile giving the possibility of whether each pixel in an input image belongs to a jet. We demonstrate that with the aid of artificial neural networks, AJIA could enable fast, accurate, and real-time coronal jet identification from SDO/AIA 304 Åobservations, which are essential in studying the collective and long-term behavior of coronal jets and their relation with the solar activity cycles.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Light Dark Matter Constraints from SuperCDMS HVeV Detectors Operated Underground with an Anticoincidence Event Selection
Authors:
SuperCDMS Collaboration,
M. F. Albakry,
I. Alkhatib,
D. Alonso-González,
D. W. P. Amaral,
J. Anczarski,
T. Aralis,
T. Aramaki,
I. J. Arnquist,
I. Ataee Langroudy,
E. Azadbakht,
C. Bathurst,
R. Bhattacharyya,
A. J. Biffl,
P. L. Brink,
M. Buchanan,
R. Bunker,
B. Cabrera,
R. Calkins,
R. A. Cameron,
C. Cartaro,
D. G. Cerdeño,
Y. -Y. Chang,
M. Chaudhuri,
J. -H. Chen
, et al. (115 additional authors not shown)
Abstract:
This article presents constraints on dark-matter-electron interactions obtained from the first underground data-taking campaign with multiple SuperCDMS HVeV detectors operated in the same housing. An exposure of 7.63 g-days is used to set upper limits on the dark-matter-electron scattering cross section for dark matter masses between 0.5 and 1000 MeV/$c^2$, as well as upper limits on dark photon k…
▽ More
This article presents constraints on dark-matter-electron interactions obtained from the first underground data-taking campaign with multiple SuperCDMS HVeV detectors operated in the same housing. An exposure of 7.63 g-days is used to set upper limits on the dark-matter-electron scattering cross section for dark matter masses between 0.5 and 1000 MeV/$c^2$, as well as upper limits on dark photon kinetic mixing and axion-like particle axioelectric coupling for masses between 1.2 and 23.3 eV/$c^2$. Compared to an earlier HVeV search, sensitivity was improved as a result of an increased overburden of 225 meters of water equivalent, an anticoincidence event selection, and better pile-up rejection. In the case of dark-matter-electron scattering via a heavy mediator, an improvement by up to a factor of 25 in cross-section sensitivity was achieved.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Knowledge Overshadowing Causes Amalgamated Hallucination in Large Language Models
Authors:
Yuji Zhang,
Sha Li,
Jiateng Liu,
Pengfei Yu,
Yi R. Fung,
Jing Li,
Manling Li,
Heng Ji
Abstract:
Hallucination is often regarded as a major impediment for using large language models (LLMs), especially for knowledge-intensive tasks. Even when the training corpus consists solely of true statements, language models still generate hallucinations in the form of amalgamations of multiple facts. We coin this phenomenon as ``knowledge overshadowing'': when we query knowledge from a language model wi…
▽ More
Hallucination is often regarded as a major impediment for using large language models (LLMs), especially for knowledge-intensive tasks. Even when the training corpus consists solely of true statements, language models still generate hallucinations in the form of amalgamations of multiple facts. We coin this phenomenon as ``knowledge overshadowing'': when we query knowledge from a language model with multiple conditions, some conditions overshadow others, leading to hallucinated outputs. This phenomenon partially stems from training data imbalance, which we verify on both pretrained models and fine-tuned models, over a wide range of LM model families and sizes.From a theoretical point of view, knowledge overshadowing can be interpreted as over-generalization of the dominant conditions (patterns). We show that the hallucination rate grows with both the imbalance ratio (between the popular and unpopular condition) and the length of dominant condition description, consistent with our derived generalization bound. Finally, we propose to utilize overshadowing conditions as a signal to catch hallucination before it is produced, along with a training-free self-contrastive decoding method to alleviate hallucination during inference. Our proposed approach showcases up to 82% F1 for hallucination anticipation and 11.2% to 39.4% hallucination control, with different models and datasets.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Leveraging Self-Supervised Learning for MIMO-OFDM Channel Representation and Generation
Authors:
Zongxi Liu,
Jiacheng Chen,
Yunting Xu,
Ting Ma,
Jingbo Liu,
Haibo Zhou,
Dusit Niyato
Abstract:
In communications theory, the capacity of multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems is fundamentally determined by wireless channels, which exhibit both diversity and correlation in spatial, frequency and temporal domains. It is further envisioned to exploit the inherent nature of channels, namely representation, to achieve geolocation-based MIMO…
▽ More
In communications theory, the capacity of multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems is fundamentally determined by wireless channels, which exhibit both diversity and correlation in spatial, frequency and temporal domains. It is further envisioned to exploit the inherent nature of channels, namely representation, to achieve geolocation-based MIMO transmission for 6G, exemplified by the fully-decoupled radio access network (FD-RAN). Accordingly, this paper first employs self-supervised learning to obtain channel representation from unlabeled channel, then proposes a channel generation assisted approach for determining MIMO precoding matrix solely based on geolocation. Specifically, we exploit the small-scale temporal domain variations of channels at a fixed geolocation, and design an ingenious pretext task tailored for contrastive learning. Then, a Transformer-based encoder is trained to output channel representations. We further develop a conditional diffusion generator to generate channel representations from geolocation. Finally, a Transformer-encoder-based decoder is utilized to reconstruct channels from generated representations, where the optimal channel is selected for calculating the precoding matrix for both single and dual BS transmission. We conduct experiments on a public ray-tracing channel dataset, and the extensive simulation results demonstrate the effectiveness of our channel representation method, and also showcase the performance improvement in geolocation-based MIMO transmission.
△ Less
Submitted 23 May, 2024;
originally announced July 2024.
-
Study of the decay and production properties of $D_{s1}(2536)$ and $D_{s2}^*(2573)$
Authors:
M. Ablikim,
M. N. Achasov,
P. Adlarson,
O. Afedulidis,
X. C. Ai,
R. Aliberti,
A. Amoroso,
Q. An,
Y. Bai,
O. Bakina,
I. Balossino,
Y. Ban,
H. -R. Bao,
V. Batozskaya,
K. Begzsuren,
N. Berger,
M. Berlowski,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
A. Bortone,
I. Boyko,
R. A. Briere,
A. Brueggemann
, et al. (645 additional authors not shown)
Abstract:
The $e^+e^-\rightarrow D_s^+D_{s1}(2536)^-$ and $e^+e^-\rightarrow D_s^+D^*_{s2}(2573)^-$ processes are studied using data samples collected with the BESIII detector at center-of-mass energies from 4.530 to 4.946~GeV. The absolute branching fractions of $D_{s1}(2536)^- \rightarrow \bar{D}^{*0}K^-$ and $D_{s2}^*(2573)^- \rightarrow \bar{D}^0K^-$ are measured for the first time to be…
▽ More
The $e^+e^-\rightarrow D_s^+D_{s1}(2536)^-$ and $e^+e^-\rightarrow D_s^+D^*_{s2}(2573)^-$ processes are studied using data samples collected with the BESIII detector at center-of-mass energies from 4.530 to 4.946~GeV. The absolute branching fractions of $D_{s1}(2536)^- \rightarrow \bar{D}^{*0}K^-$ and $D_{s2}^*(2573)^- \rightarrow \bar{D}^0K^-$ are measured for the first time to be $(35.9\pm 4.8\pm 3.5)\%$ and $(37.4\pm 3.1\pm 4.6)\%$, respectively. The measurements are in tension with predictions based on the assumption that the $D_{s1}(2536)$ and $D_{s2}^*(2573)$ are dominated by a bare $c\bar{s}$ component. The $e^+e^-\rightarrow D_s^+D_{s1}(2536)^-$ and $e^+e^-\rightarrow D_s^+D^*_{s2}(2573)^-$ cross sections are measured, and a resonant structure at around 4.6~GeV with a width of 50~MeV is observed for the first time with a statistical significance of $15σ$ in the $e^+e^-\rightarrow D_s^+D^*_{s2}(2573)^-$ process. It could be the $Y(4626)$ found by the Belle collaboration in the $D_s^+D_{s1}(2536)^{-}$ final state, since they have similar masses and widths. There is also evidence for a structure at around 4.75~GeV in both processes.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Beyond Benchmarking: A New Paradigm for Evaluation and Assessment of Large Language Models
Authors:
Jin Liu,
Qingquan Li,
Wenlong Du
Abstract:
In current benchmarks for evaluating large language models (LLMs), there are issues such as evaluation content restriction, untimely updates, and lack of optimization guidance. In this paper, we propose a new paradigm for the measurement of LLMs: Benchmarking-Evaluation-Assessment. Our paradigm shifts the "location" of LLM evaluation from the "examination room" to the "hospital". Through conductin…
▽ More
In current benchmarks for evaluating large language models (LLMs), there are issues such as evaluation content restriction, untimely updates, and lack of optimization guidance. In this paper, we propose a new paradigm for the measurement of LLMs: Benchmarking-Evaluation-Assessment. Our paradigm shifts the "location" of LLM evaluation from the "examination room" to the "hospital". Through conducting a "physical examination" on LLMs, it utilizes specific task-solving as the evaluation content, performs deep attribution of existing problems within LLMs, and provides recommendation for optimization.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Dynamics of asymmetrically deformed skyrmion driven by internal forces and strain force in a flower-shaped magnetic nanostructure
Authors:
Zhen-Yu Tan,
Ji-Pei Chen,
Yu-Ke Shi,
Yuan Chen,
Ming-Hui Qin,
Xing-Sen Gao,
Jun-Ming Liu
Abstract:
Magnetic skyrmions emerge as promising quasi-particles for encoding information in nextgeneration spintronic devices. Their innate flexibility in shape is essential for the applications although they were often ideally treated as rigid particles. In this work, we investigated the voltagecontrolled uniform strain mediated dynamics of deformed skyrmions in heterostructures with a flower-shaped magne…
▽ More
Magnetic skyrmions emerge as promising quasi-particles for encoding information in nextgeneration spintronic devices. Their innate flexibility in shape is essential for the applications although they were often ideally treated as rigid particles. In this work, we investigated the voltagecontrolled uniform strain mediated dynamics of deformed skyrmions in heterostructures with a flower-shaped magnetic nanostructure, using micromagnetic simulations. The simulated results revealed the possible states of isolated skyrmion nucleated in the nanostructure, which can be mutually switched by applying suitable in-plane strain pulses. In addition, it was found that the skyrmion motions are driven by the emerging internal forces and strain force, which originate from the asymmetric deformation of skyrmion structures. Furthermore, an analytical model of deformed skyrmions was proposed to interpret the dependences of internal forces and strain force on the asymmetric deformation of skyrmion, with some formulae derived for these forces in a semi-analytical approach. Further calculations based on these formulae verified the forces appearing in the skyrmion motion, with the resulting forces showing consistence with the simulated data. This suggested that our semi-analytical model successfully captures the main physics responsible for the motion of deformed skyrmion in the nanostructure. Our work extends the understanding of the mechanics emerging in deformed skyrmion, and provides an effective approach for deterministic manipulation of deformed skyrmion motion via strain forces and internal forces, which may be instructive to design of skyrmion-based spintronic devices.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Trustworthy Contrast-enhanced Brain MRI Synthesis
Authors:
Jiyao Liu,
Yuxin Li,
Shangqi Gao,
Yuncheng Zhou,
Xin Gao,
Ningsheng Xu,
Xiao-Yong Zhang,
Xiahai Zhuang
Abstract:
Contrast-enhanced brain MRI (CE-MRI) is a valuable diagnostic technique but may pose health risks and incur high costs. To create safer alternatives, multi-modality medical image translation aims to synthesize CE-MRI images from other available modalities. Although existing methods can generate promising predictions, they still face two challenges, i.e., exhibiting over-confidence and lacking inte…
▽ More
Contrast-enhanced brain MRI (CE-MRI) is a valuable diagnostic technique but may pose health risks and incur high costs. To create safer alternatives, multi-modality medical image translation aims to synthesize CE-MRI images from other available modalities. Although existing methods can generate promising predictions, they still face two challenges, i.e., exhibiting over-confidence and lacking interpretability on predictions. To address the above challenges, this paper introduces TrustI2I, a novel trustworthy method that reformulates multi-to-one medical image translation problem as a multimodal regression problem, aiming to build an uncertainty-aware and reliable system. Specifically, our method leverages deep evidential regression to estimate prediction uncertainties and employs an explicit intermediate and late fusion strategy based on the Mixture of Normal Inverse Gamma (MoNIG) distribution, enhancing both synthesis quality and interpretability. Additionally, we incorporate uncertainty calibration to improve the reliability of uncertainty. Validation on the BraTS2018 dataset demonstrates that our approach surpasses current methods, producing higher-quality images with rational uncertainty estimation.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Real-time system optimal traffic routing under uncertainties -- Can physics models boost reinforcement learning?
Authors:
Zemian Ke,
Qiling Zou,
Jiachao Liu,
Sean Qian
Abstract:
System optimal traffic routing can mitigate congestion by assigning routes for a portion of vehicles so that the total travel time of all vehicles in the transportation system can be reduced. However, achieving real-time optimal routing poses challenges due to uncertain demands and unknown system dynamics, particularly in expansive transportation networks. While physics model-based methods are sen…
▽ More
System optimal traffic routing can mitigate congestion by assigning routes for a portion of vehicles so that the total travel time of all vehicles in the transportation system can be reduced. However, achieving real-time optimal routing poses challenges due to uncertain demands and unknown system dynamics, particularly in expansive transportation networks. While physics model-based methods are sensitive to uncertainties and model mismatches, model-free reinforcement learning struggles with learning inefficiencies and interpretability issues. Our paper presents TransRL, a novel algorithm that integrates reinforcement learning with physics models for enhanced performance, reliability, and interpretability. TransRL begins by establishing a deterministic policy grounded in physics models, from which it learns from and is guided by a differentiable and stochastic teacher policy. During training, TransRL aims to maximize cumulative rewards while minimizing the Kullback Leibler (KL) divergence between the current policy and the teacher policy. This approach enables TransRL to simultaneously leverage interactions with the environment and insights from physics models. We conduct experiments on three transportation networks with up to hundreds of links. The results demonstrate TransRL's superiority over traffic model-based methods for being adaptive and learning from the actual network data. By leveraging the information from physics models, TransRL consistently outperforms state-of-the-art reinforcement learning algorithms such as proximal policy optimization (PPO) and soft actor critic (SAC). Moreover, TransRL's actions exhibit higher reliability and interpretability compared to baseline reinforcement learning approaches like PPO and SAC.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
In-Orbit Processing or Not? Sunlight-Aware Task Scheduling for Energy-Efficient Space Edge Computing Networks
Authors:
Weisen Liu,
Zeqi Lai,
Qian Wu,
Hewu Li,
Qi Zhang,
Zonglun Li,
Yuanjie Li,
Jun Liu
Abstract:
With the rapid evolution of space-borne capabilities, space edge computing (SEC) is becoming a new computation paradigm for future integrated space and terrestrial networks. Satellite edges adopt advanced on-board hardware, which not only enables new opportunities to perform complex intelligent tasks in orbit, but also involves new challenges due to the additional energy consumption in power-const…
▽ More
With the rapid evolution of space-borne capabilities, space edge computing (SEC) is becoming a new computation paradigm for future integrated space and terrestrial networks. Satellite edges adopt advanced on-board hardware, which not only enables new opportunities to perform complex intelligent tasks in orbit, but also involves new challenges due to the additional energy consumption in power-constrained space environment. In this paper, we present PHOENIX, an energy-efficient task scheduling framework for emerging SEC networks. PHOENIX exploits a key insight that in the SEC network, there always exist a number of sunlit edges which are illuminated during the entire orbital period and have sufficient energy supplement from the sun. PHOENIX accomplishes energy-efficient in-orbit computing by judiciously offloading space tasks to "sunlight-sufficient" edges or to the ground. Specifically, PHOENIX first formulates the SEC battery energy optimizing (SBEO) problem which aims at minimizing the average battery energy consumption while satisfying various task completion constraints. Then PHOENIX incorporates a sunlight-aware scheduling mechanism to solve the SBEO problem and schedule SEC tasks efficiently. Finally, we implement a PHOENIX prototype and build an SEC testbed. Extensive data-driven evaluations demonstrate that as compared to other state-of-the-art solutions, PHOENIX can effectively reduce up to 54.8% SEC battery energy consumption and prolong battery lifetime to 2.9$\times$ while still completing tasks on time.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves
Authors:
Jianshuo Liu,
Hong Li,
Haining Wang,
Mengjie Sun,
Hui Wen,
Jinfa Wang,
Limin Sun
Abstract:
Real-time Clock (RTC) has been widely used in various real-time systems to provide precise system time. In this paper, we reveal a new security vulnerability of the RTC circuit, where the internal storage time or timestamp can be arbitrarily modified forward or backward. The security threat of dynamic modifications of system time caused by this vulnerability is called TimeTravel. Based on acoustic…
▽ More
Real-time Clock (RTC) has been widely used in various real-time systems to provide precise system time. In this paper, we reveal a new security vulnerability of the RTC circuit, where the internal storage time or timestamp can be arbitrarily modified forward or backward. The security threat of dynamic modifications of system time caused by this vulnerability is called TimeTravel. Based on acoustic resonance and piezoelectric effects, TimeTravel applies acoustic guide waves to the quartz crystal, thereby adjusting the characteristics of the oscillating signal transmitted into the RTC circuit. By manipulating the parameters of acoustic waves, TimeTravel can accelerate or decelerate the timing speed of system time at an adjustable rate, resulting in the relative drift of the timing, which can pose serious safety threats. To assess the severity of TimeTravel, we examine nine modules and two commercial devices under the RTC circuit. The experimental results show that TimeTravel can drift system time forward and backward at a chosen speed with a maximum 93% accuracy. Our analysis further shows that TimeTravel can maintain an attack success rate of no less than 77% under environments with typical obstacle items.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Dynamic Correlation Learning and Regularization for Multi-Label Confidence Calibration
Authors:
Tianshui Chen,
Weihang Wang,
Tao Pu,
Jinghui Qin,
Zhijing Yang,
Jie Liu,
Liang Lin
Abstract:
Modern visual recognition models often display overconfidence due to their reliance on complex deep neural networks and one-hot target supervision, resulting in unreliable confidence scores that necessitate calibration. While current confidence calibration techniques primarily address single-label scenarios, there is a lack of focus on more practical and generalizable multi-label contexts. This pa…
▽ More
Modern visual recognition models often display overconfidence due to their reliance on complex deep neural networks and one-hot target supervision, resulting in unreliable confidence scores that necessitate calibration. While current confidence calibration techniques primarily address single-label scenarios, there is a lack of focus on more practical and generalizable multi-label contexts. This paper introduces the Multi-Label Confidence Calibration (MLCC) task, aiming to provide well-calibrated confidence scores in multi-label scenarios. Unlike single-label images, multi-label images contain multiple objects, leading to semantic confusion and further unreliability in confidence scores. Existing single-label calibration methods, based on label smoothing, fail to account for category correlations, which are crucial for addressing semantic confusion, thereby yielding sub-optimal performance. To overcome these limitations, we propose the Dynamic Correlation Learning and Regularization (DCLR) algorithm, which leverages multi-grained semantic correlations to better model semantic confusion for adaptive regularization. DCLR learns dynamic instance-level and prototype-level similarities specific to each category, using these to measure semantic correlations across different categories. With this understanding, we construct adaptive label vectors that assign higher values to categories with strong correlations, thereby facilitating more effective regularization. We establish an evaluation benchmark, re-implementing several advanced confidence calibration algorithms and applying them to leading multi-label recognition (MLR) models for fair comparison. Through extensive experiments, we demonstrate the superior performance of DCLR over existing methods in providing reliable confidence scores in multi-label scenarios.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
HTD-Mamba: Efficient Hyperspectral Target Detection with Pyramid State Space Model
Authors:
Dunbin Shen,
Xuanbing Zhu,
Jiacheng Tian,
Jianjun Liu,
Zhenrong Du,
Hongyu Wang,
Xiaorui Ma
Abstract:
Hyperspectral target detection (HTD) identifies objects of interest from complex backgrounds at the pixel level, playing a vital role in Earth observation. However, HTD faces challenges due to limited prior knowledge and spectral variations, leading to underfitting models and unreliable performance. To address these challenges, this paper proposes an efficient self-supervised HTD method with a pyr…
▽ More
Hyperspectral target detection (HTD) identifies objects of interest from complex backgrounds at the pixel level, playing a vital role in Earth observation. However, HTD faces challenges due to limited prior knowledge and spectral variations, leading to underfitting models and unreliable performance. To address these challenges, this paper proposes an efficient self-supervised HTD method with a pyramid state space model (SSM), named HTD-Mamba, which employs spectrally contrastive learning to distinguish between target and background based on the similarity measurement of intrinsic features. Specifically, to obtain sufficient training samples and leverage spatial contextual information, we propose a spatial-encoded spectral augmentation technique that encodes all surrounding pixels within a patch into a transformed view of the central pixel. Additionally, to explore global band correlations, we divide pixels into continuous group-wise spectral embeddings and introduce Mamba to HTD for the first time to model long-range dependencies of the spectral sequence with linear complexity. Furthermore, to alleviate spectral variation and enhance robust representation, we propose a pyramid SSM as a backbone to capture and fuse multiresolution spectral-wise intrinsic features. Extensive experiments conducted on four public datasets demonstrate that the proposed method outperforms state-of-the-art methods in both quantitative and qualitative evaluations. Code is available at \url{https://github.com/shendb2022/HTD-Mamba}.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
A Back-End Electronics Based on Fiber Communication for Small to Medium-Scale Physics Experiments
Authors:
Jianguo Liu,
Yu Wang,
Changqing Feng,
Shubin Liu,
Qian Chen
Abstract:
Many small and medium-sized physics experiments are being conducted worldwide. These experiments have similar requirements for readout electronics, especially the back-end electronics. Some experiments need a trigger logic unit(TLU) to provide timing and synchronous control signals. This paper introduces a back-end electronics design for small and medium-sized physics experiments; it adopts a daug…
▽ More
Many small and medium-sized physics experiments are being conducted worldwide. These experiments have similar requirements for readout electronics, especially the back-end electronics. Some experiments need a trigger logic unit(TLU) to provide timing and synchronous control signals. This paper introduces a back-end electronics design for small and medium-sized physics experiments; it adopts a daughter-motherboard structure integrated TLU function to provide greater flexibility. Different interfaces and protocols can be flexibly selected according to data bandwidth requirements. It supports 32 optical fiber interfaces based on a field-programmable gate array (FPGA) of normal IOs with 400Mbps of data bandwidth for each channel. At the same time, it supports 16 high-speed communication interfaces based on GTX port with several Gbps data bandwidth of each channel. For the TLU function, this design has 8 HDMI interfaces and one RJ45 interface to provide synchronous triggers and other control signals, and it has six analog LEMOs and four digital LEMOs to accept asynchronous signals from an external source. These design specifications can meet the needs of most small and medium-sized experiments. This set of back-end electronics has been successfully used in experiments such as PandaX-III, VLAST, and moungraphy. Moreover, it has successfully conducted beam tests with a readout of the data of VLAST detectors at CERN.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
SKYCASTLE: Taming LEO Mobility to Facilitate Seamless and Low-latency Satellite Internet Services
Authors:
Jihao Li,
Hewu Li,
Zeqi Lai,
Qian Wu,
Weisen Liu,
Xiaomo Wang,
Yuanjie Li,
Jun Liu,
Qi Zhang
Abstract:
Emerging integrated space and terrestrial networks (ISTN) built upon low earth orbit (LEO) satellite constellations aim at providing planet-wide Internet services, not only for residential users, but also for mobile users (e.g., in airplane and cruise scenarios). Efficiently managing global mobility and keeping connections active for mobile users is critical for ISTN operators. However, our quanti…
▽ More
Emerging integrated space and terrestrial networks (ISTN) built upon low earth orbit (LEO) satellite constellations aim at providing planet-wide Internet services, not only for residential users, but also for mobile users (e.g., in airplane and cruise scenarios). Efficiently managing global mobility and keeping connections active for mobile users is critical for ISTN operators. However, our quantitative analysis identifies that existing mobility management (MM) schemes suffer from frequent connection interruptions and long latency in ISTN scenarios. The fundamental challenge stems from a unique characteristic of ISTNs: not only users are mobile, but also core network infrastructures (i.e., LEO satellites) are frequently changing their locations in the network. To facilitate seamless and low-latency satellite Internet services, this paper presents SKYCASTLE, a novel network-based global mobility management mechanism. SKYCASTLE incorporates two key techniques to address frequent connection interruptions in ISTNs. First, to reduce the interruption time, SKYCASTLE adopts distributed satellite anchors to track the location changes of mobile nodes, manage handovers and avoid routing convergence. Second, SKYCASTLE leverages an anchor manager to schedule MM functionalities at satellites to reduce deployment costs while guaranteeing low latency. Extensive evaluations combining real constellation information and mobile user trajectories show that: SKYCASTLE can improve up to 55.8% uninterrupted time and reduce 47.8% latency as compared to other existing MM solutions.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Exploring the Causality of End-to-End Autonomous Driving
Authors:
Jiankun Li,
Hao Li,
Jiangjiang Liu,
Zhikang Zou,
Xiaoqing Ye,
Fan Wang,
Jizhou Huang,
Hua Wu,
Haifeng Wang
Abstract:
Deep learning-based models are widely deployed in autonomous driving areas, especially the increasingly noticed end-to-end solutions. However, the black-box property of these models raises concerns about their trustworthiness and safety for autonomous driving, and how to debug the causality has become a pressing concern. Despite some existing research on the explainability of autonomous driving, t…
▽ More
Deep learning-based models are widely deployed in autonomous driving areas, especially the increasingly noticed end-to-end solutions. However, the black-box property of these models raises concerns about their trustworthiness and safety for autonomous driving, and how to debug the causality has become a pressing concern. Despite some existing research on the explainability of autonomous driving, there is currently no systematic solution to help researchers debug and identify the key factors that lead to the final predicted action of end-to-end autonomous driving. In this work, we propose a comprehensive approach to explore and analyze the causality of end-to-end autonomous driving. First, we validate the essential information that the final planning depends on by using controlled variables and counterfactual interventions for qualitative analysis. Then, we quantitatively assess the factors influencing model decisions by visualizing and statistically analyzing the response of key model inputs. Finally, based on the comprehensive study of the multi-factorial end-to-end autonomous driving system, we have developed a strong baseline and a tool for exploring causality in the close-loop simulator CARLA. It leverages the essential input sources to obtain a well-designed model, resulting in highly competitive capabilities. As far as we know, our work is the first to unveil the mystery of end-to-end autonomous driving and turn the black box into a white one. Thorough close-loop experiments demonstrate that our method can be applied to end-to-end autonomous driving solutions for causality debugging. Code will be available at https://github.com/bdvisl/DriveInsight.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Lepton flavor of four-fermion operator and fermion portal dark matter
Authors:
Yuxuan He,
Gang Li,
Jia Liu,
Xiao-Ping Wang,
Xiang Zhao
Abstract:
We study the ultraviolet completion of semileptonic four-fermion operator $O_{ledq}^{αβ11}$ that incorporates Majorana dark matter (DM) in both lepton-flavor-conserving (LFC) and lepton-flavor-violating (LFV) scenarios at the one-loop level via box diagram, which effectively alleviates the lower bounds on the new physics scale. The interplay between the model-independent constraints on the Wilson…
▽ More
We study the ultraviolet completion of semileptonic four-fermion operator $O_{ledq}^{αβ11}$ that incorporates Majorana dark matter (DM) in both lepton-flavor-conserving (LFC) and lepton-flavor-violating (LFV) scenarios at the one-loop level via box diagram, which effectively alleviates the lower bounds on the new physics scale. The interplay between the model-independent constraints on the Wilson coefficients and DM direct detection, relic density, and collider searches in the context of fermion portal DM model with two mediators is investigated. We find that both the projected future constraint on the LFC Wilson coefficient $C_{ledq}^{2211}/Λ^2< (12.3~\text{TeV})^{-2}$ from the measurements of neutrino non-standard interaction in the next-generation neutrino oscillation experiments, and LFV constraint $C_{ledq}^{1211}/Λ^2< \left(2.2\times 10^3 ~\text{TeV} \right)^{-2}$ from ongoing charged-lepton-flavor-violation searches, provide a complementary exploration of the parameter space encompassing the DM mass and scalar mass. With the colored mediator mass typically around $2~\text{TeV}$, the sensitivity of the indirect constraints on the four-fermion operator could surpass those of collider searches and DM direct detection, in scenarios where the masses of the DM and scalar are close. By ensuring the correct DM relic density, however, we obtain that the collider searches and DM direct detection are more sensitive to the electroweak scale DM and scalar compared to the indirect constraints.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
LuSNAR:A Lunar Segmentation, Navigation and Reconstruction Dataset based on Muti-sensor for Autonomous Exploration
Authors:
Jiayi Liu,
Qianyu Zhang,
Xue Wan,
Shengyang Zhang,
Yaolin Tian,
Haodong Han,
Yutao Zhao,
Baichuan Liu,
Zeyuan Zhao,
Xubo Luo
Abstract:
With the complexity of lunar exploration missions, the moon needs to have a higher level of autonomy. Environmental perception and navigation algorithms are the foundation for lunar rovers to achieve autonomous exploration. The development and verification of algorithms require highly reliable data support. Most of the existing lunar datasets are targeted at a single task, lacking diverse scenes a…
▽ More
With the complexity of lunar exploration missions, the moon needs to have a higher level of autonomy. Environmental perception and navigation algorithms are the foundation for lunar rovers to achieve autonomous exploration. The development and verification of algorithms require highly reliable data support. Most of the existing lunar datasets are targeted at a single task, lacking diverse scenes and high-precision ground truth labels. To address this issue, we propose a multi-task, multi-scene, and multi-label lunar benchmark dataset LuSNAR. This dataset can be used for comprehensive evaluation of autonomous perception and navigation systems, including high-resolution stereo image pairs, panoramic semantic labels, dense depth maps, LiDAR point clouds, and the position of rover. In order to provide richer scene data, we built 9 lunar simulation scenes based on Unreal Engine. Each scene is divided according to topographic relief and the density of objects. To verify the usability of the dataset, we evaluated and analyzed the algorithms of semantic segmentation, 3D reconstruction, and autonomous navigation. The experiment results prove that the dataset proposed in this paper can be used for ground verification of tasks such as autonomous environment perception and navigation, and provides a lunar benchmark dataset for testing the accessibility of algorithm metrics. We make LuSNAR publicly available at: https://github.com/autumn999999/LuSNAR-dataset.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Scaling Exponents Across Parameterizations and Optimizers
Authors:
Katie Everett,
Lechao Xiao,
Mitchell Wortsman,
Alexander A. Alemi,
Roman Novak,
Peter J. Liu,
Izzeddin Gur,
Jascha Sohl-Dickstein,
Leslie Pack Kaelbling,
Jaehoon Lee,
Jeffrey Pennington
Abstract:
Robust and effective scaling of models from small to large width typically requires the precise adjustment of many algorithmic and architectural details, such as parameterization and optimizer choices. In this work, we propose a new perspective on parameterization by investigating a key assumption in prior work about the alignment between parameters and data and derive new theoretical results unde…
▽ More
Robust and effective scaling of models from small to large width typically requires the precise adjustment of many algorithmic and architectural details, such as parameterization and optimizer choices. In this work, we propose a new perspective on parameterization by investigating a key assumption in prior work about the alignment between parameters and data and derive new theoretical results under weaker assumptions and a broader set of optimizers. Our extensive empirical investigation includes tens of thousands of models trained with all combinations of three optimizers, four parameterizations, several alignment assumptions, more than a dozen learning rates, and fourteen model sizes up to 26.8B parameters. We find that the best learning rate scaling prescription would often have been excluded by the assumptions in prior work. Our results show that all parameterizations, not just maximal update parameterization (muP), can achieve hyperparameter transfer; moreover, our novel per-layer learning rate prescription for standard parameterization outperforms muP. Finally, we demonstrate that an overlooked aspect of parameterization, the epsilon parameter in Adam, must be scaled correctly to avoid gradient underflow and propose Adam-atan2, a new numerically stable, scale-invariant version of Adam that eliminates the epsilon hyperparameter entirely.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Revisiting for maximal flavor violating $Z^{'}_{eμ}$ and its phenomenology constraints
Authors:
Jia Liu,
Muyuan Song,
Haohao Zhang
Abstract:
Lepton flavor violation (LFV), observed conclusively in neutrino oscillations, remains a pivotal area of investigation due to its absence in the Standard Model (SM). Beyond the Standard Model (BSM) physics explores charged lepton flavor violation (CLFV), particularly through new particle candidates such as the $Z^{'}$. This article focuses on maximal LFV interactions facilitated by the $Z^{'}$ bos…
▽ More
Lepton flavor violation (LFV), observed conclusively in neutrino oscillations, remains a pivotal area of investigation due to its absence in the Standard Model (SM). Beyond the Standard Model (BSM) physics explores charged lepton flavor violation (CLFV), particularly through new particle candidates such as the $Z^{'}$. This article focuses on maximal LFV interactions facilitated by the $Z^{'}$ boson, specifically targeting its off-diagonal interactions with the first and second generations of charged and neutral leptons. In our ultraviolet (UV) model for the origin of the $Z^{'}$, inspired by the work of [R.Foot \textit{et al.,}~arxiv:hep-ph/9401250], we utilize the discrete $Z_2$ symmetry to investigate the maximal LFV mediated by the $Z^{'}$ between the muon ($μ$) and electron ($e$) arising from the additional scalars. This symmetry prohibits flavor-conserving interactions between $Z'$ and $μ^+μ^-,\, e^+e^-$. In conjunction with collider, $(g-2)_μ, (g-2)_e$, inverse $μ$ decay and LFV decay constraints, we provide forecasts for anticipated limits derived from processes such as $ν_μN \to ν_e μ^+ e^- N$ in neutrino trident experiments like the DUNE experiment. These limits highlight the prospective scope and significance of LFV investigations within these experimental frameworks. From the range of mass between 0.01 GeV and 10 GeV, the most stringent limit arise from $ \textit{B} (μ\to e + X +γ)$ for $M_{Z^{'}} < m_μ$ while neutrino trident processes constrain effectively as $M_{Z^{'}} \to 10$ GeV.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Fast and Continual Knowledge Graph Embedding via Incremental LoRA
Authors:
Jiajun Liu,
Wenjun Ke,
Peng Wang,
Jiahao Wang,
Jinhua Gao,
Ziyu Shang,
Guozheng Li,
Zijie Xu,
Ke Ji,
Yining Li
Abstract:
Continual Knowledge Graph Embedding (CKGE) aims to efficiently learn new knowledge and simultaneously preserve old knowledge. Dominant approaches primarily focus on alleviating catastrophic forgetting of old knowledge but neglect efficient learning for the emergence of new knowledge. However, in real-world scenarios, knowledge graphs (KGs) are continuously growing, which brings a significant chall…
▽ More
Continual Knowledge Graph Embedding (CKGE) aims to efficiently learn new knowledge and simultaneously preserve old knowledge. Dominant approaches primarily focus on alleviating catastrophic forgetting of old knowledge but neglect efficient learning for the emergence of new knowledge. However, in real-world scenarios, knowledge graphs (KGs) are continuously growing, which brings a significant challenge to fine-tuning KGE models efficiently. To address this issue, we propose a fast CKGE framework (\model), incorporating an incremental low-rank adapter (\mec) mechanism to efficiently acquire new knowledge while preserving old knowledge. Specifically, to mitigate catastrophic forgetting, \model\ isolates and allocates new knowledge to specific layers based on the fine-grained influence between old and new KGs. Subsequently, to accelerate fine-tuning, \model\ devises an efficient \mec\ mechanism, which embeds the specific layers into incremental low-rank adapters with fewer training parameters. Moreover, \mec\ introduces adaptive rank allocation, which makes the LoRA aware of the importance of entities and adjusts its rank scale adaptively. We conduct experiments on four public datasets and two new datasets with a larger initial scale. Experimental results demonstrate that \model\ can reduce training time by 34\%-49\% while still achieving competitive link prediction performance against state-of-the-art models on four public datasets (average MRR score of 21.0\% vs. 21.1\%).Meanwhile, on two newly constructed datasets, \model\ saves 51\%-68\% training time and improves link prediction performance by 1.5\%.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
OneDiff: A Generalist Model for Image Difference
Authors:
Erdong Hu,
Longteng Guo,
Tongtian Yue,
Zijia Zhao,
Shuning Xue,
Jing Liu
Abstract:
In computer vision, Image Difference Captioning (IDC) is crucial for accurately describing variations between closely related images. Traditional IDC methods often rely on specialist models, which restrict their applicability across varied contexts. This paper introduces the OneDiff model, a novel generalist approach that utilizes a robust vision-language model architecture, integrating a siamese…
▽ More
In computer vision, Image Difference Captioning (IDC) is crucial for accurately describing variations between closely related images. Traditional IDC methods often rely on specialist models, which restrict their applicability across varied contexts. This paper introduces the OneDiff model, a novel generalist approach that utilizes a robust vision-language model architecture, integrating a siamese image encoder with a Visual Delta Module. This innovative configuration allows for the precise detection and articulation of fine-grained differences between image pairs. OneDiff is trained through a dual-phase strategy, encompassing Coupled Sample Training and multi-task learning across a diverse array of data types, supported by our newly developed DiffCap Dataset. This dataset merges real-world and synthetic data, enhancing the training process and bolstering the model's robustness. Extensive testing on diverse IDC benchmarks, such as Spot-the-Diff, CLEVR-Change, and Birds-to-Words, shows that OneDiff consistently outperforms existing state-of-the-art models in accuracy and adaptability, achieving improvements of up to 85\% CIDEr points in average. By setting a new benchmark in IDC, OneDiff paves the way for more versatile and effective applications in detecting and describing visual differences. The code, models, and data will be made publicly available.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Hidden Convexity-Based Distributed Operation of Integrated Electricity-Gas Systems
Authors:
Rong-Peng Liu,
Yue Song,
Junhong Liu,
Xiaozhe Wang,
Jinpeng Guo,
Yunhe Hou
Abstract:
We propose a hidden convexity-based method to address distributed optimal energy flow (OEF) problems for transmission-level integrated electricity-gas systems. First, we develop a node-wise decoupling method to de-compose an OEF problem into multiple OEF subproblems. Then, we propose a hidden convexity-based method to equivalently reformulate nonconvex OEF subproblems as semi-definite programs. Th…
▽ More
We propose a hidden convexity-based method to address distributed optimal energy flow (OEF) problems for transmission-level integrated electricity-gas systems. First, we develop a node-wise decoupling method to de-compose an OEF problem into multiple OEF subproblems. Then, we propose a hidden convexity-based method to equivalently reformulate nonconvex OEF subproblems as semi-definite programs. This method differs from any ap-proximation and convexification methods that may incur infeasible solutions. Since all OEF subproblems are origi-nally convex or equivalently convexified, we adopt an ADMM to solve the hidden convexity-based distributed OEF problem with convergence analysis. Test results validate the effectiveness of the proposed method, especially in handling a large number of agents.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Ada-adapter:Fast Few-shot Style Personlization of Diffusion Model with Pre-trained Image Encoder
Authors:
Jia Liu,
Changlin Li,
Qirui Sun,
Jiahui Ming,
Chen Fang,
Jue Wang,
Bing Zeng,
Shuaicheng Liu
Abstract:
Fine-tuning advanced diffusion models for high-quality image stylization usually requires large training datasets and substantial computational resources, hindering their practical applicability. We propose Ada-Adapter, a novel framework for few-shot style personalization of diffusion models. Ada-Adapter leverages off-the-shelf diffusion models and pre-trained image feature encoders to learn a com…
▽ More
Fine-tuning advanced diffusion models for high-quality image stylization usually requires large training datasets and substantial computational resources, hindering their practical applicability. We propose Ada-Adapter, a novel framework for few-shot style personalization of diffusion models. Ada-Adapter leverages off-the-shelf diffusion models and pre-trained image feature encoders to learn a compact style representation from a limited set of source images. Our method enables efficient zero-shot style transfer utilizing a single reference image. Furthermore, with a small number of source images (three to five are sufficient) and a few minutes of fine-tuning, our method can capture intricate style details and conceptual characteristics, generating high-fidelity stylized images that align well with the provided text prompts. We demonstrate the effectiveness of our approach on various artistic styles, including flat art, 3D rendering, and logo design. Our experimental results show that Ada-Adapter outperforms existing zero-shot and few-shot stylization methods in terms of output quality, diversity, and training efficiency.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Cornerstones are the Key Stones: Using Interpretable Machine Learning to Probe the Clogging Process in 2D Granular Hoppers
Authors:
Jesse M. Hanlan,
Sam Dillavou,
Andrea J. Liu,
Douglas J. Durian
Abstract:
The sudden arrest of flow by formation of a stable arch over an outlet is a unique and characteristic feature of granular materials. Previous work suggests that grains near the outlet randomly sample configurational flow microstates until a clog-causing flow microstate is reached. However, factors that lead to clogging remain elusive. Here we experimentally observe over 50,000 clogging events for…
▽ More
The sudden arrest of flow by formation of a stable arch over an outlet is a unique and characteristic feature of granular materials. Previous work suggests that grains near the outlet randomly sample configurational flow microstates until a clog-causing flow microstate is reached. However, factors that lead to clogging remain elusive. Here we experimentally observe over 50,000 clogging events for a tridisperse mixture of quasi-2D circular grains, and utilize a variety of machine learning (ML) methods to search for predictive signatures of clogging microstates. This approach fares just modestly better than chance. Nevertheless, our analysis using linear Support Vector Machines (SVMs) highlights the position of potential arch cornerstones as a key factor in clogging likelihood. We verify this experimentally by varying the position of a fixed (cornerstone) grain, and show that such a grain dictates the size of feasible flow-ending arches, and thus the time and mass of each flow. Positioning this grain correctly can even increase the ejected mass by over 50%. Our findings demonstrate that interpretable ML algorithms like SVMs can uncover meaningful physics even when their predictive power is below the standards of conventional ML practice.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
DIVESPOT: Depth Integrated Volume Estimation of Pile of Things Based on Point Cloud
Authors:
Yiran Ling,
Rongqiang Zhao,
Yixuan Shen,
Dongbo Li,
Jing Jin,
Jie Liu
Abstract:
Non-contact volume estimation of pile-type objects has considerable potential in industrial scenarios, including grain, coal, mining, and stone materials. However, using existing method for these scenarios is challenged by unstable measurement poses, significant light interference, the difficulty of training data collection, and the computational burden brought by large piles. To address the above…
▽ More
Non-contact volume estimation of pile-type objects has considerable potential in industrial scenarios, including grain, coal, mining, and stone materials. However, using existing method for these scenarios is challenged by unstable measurement poses, significant light interference, the difficulty of training data collection, and the computational burden brought by large piles. To address the above issues, we propose the Depth Integrated Volume EStimation of Pile Of Things (DIVESPOT) based on point cloud technology in this study. For the challenges of unstable measurement poses, the point cloud pose correction and filtering algorithm is designed based on the Random Sample Consensus (RANSAC) and the Hierarchical Density-Based Spatial Clustering of Applications with Noise (HDBSCAN). To cope with light interference and to avoid the relying on training data, the height-distribution-based ground feature extraction algorithm is proposed to achieve RGB-independent. To reduce the computational burden, the storage space optimizing strategy is developed, such that accurate estimation can be acquired by using compressed voxels. Experimental results demonstrate that the DIVESPOT method enables non-data-driven, RGB-independent segmentation of pile point clouds, maintaining a volume calculation relative error within 2%. Even with 90% compression of the voxel mesh, the average error of the results can be under 3%.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Experimental investigation of direct non-Hermitian measurement and uncertainty relation towards high-dimensional quantum domain
Authors:
Yi-Tao Wang,
Zhao-An Wang,
Zhi-Peng Li,
Xiao-Dong Zeng,
Jia-Ming Ren,
Wei Liu,
Yuan-Ze Yang,
Nai-Jie Guo,
Lin-Ke Xie,
Jun-You Liu,
Yu-Hang Ma,
Jian-Shun Tang,
Chengjie Zhang,
Chuan-Feng Li,
Guang-Can Guo
Abstract:
Non-Hermitian dynamics in quantum systems have unveiled novel phenomena, yet the implementation of valid non-Hermitian quantum measurement remains a challenge, because a universal quantum projective mechanism on the complete but skewed non-Hermitian eigenstates is not explicit in experiment. This limitation hinders the direct acquisition of non-Hermitian observable statistics (e.g., non-Hermitian…
▽ More
Non-Hermitian dynamics in quantum systems have unveiled novel phenomena, yet the implementation of valid non-Hermitian quantum measurement remains a challenge, because a universal quantum projective mechanism on the complete but skewed non-Hermitian eigenstates is not explicit in experiment. This limitation hinders the direct acquisition of non-Hermitian observable statistics (e.g., non-Hermitian population dynamics), also constrains investigations of non-Hermitian quantum measurement properties such as uncertainty relation. Here, we address these challenges by presenting a non-Hermitian projective protocol and investigating the non-Hermitian uncertainty relation. We derive the uncertainty relation for pseudo-Hermitian (PH) observables that is generalized beyond the Hermitian ones. We then investigate the projective properties of general quantum states onto complete non-Hermitian eigenvectors, and present a quantum simulating method to apply the valid non-Hermitian projective measurement on a direct-sum dilated space. Subsequently, we experimentally construct a quantum simulator in the quantum optical circuit and realize the 3-dimensional non-Hermitian quantum measurement on the single-photon qutrit. Employing this platform, we explore the uncertainty relation experimentally with different PH metrics. Our non-Hermitian quantum measurement method is state-independent and outputs directly the non-Hermitian quantum projective statistics, paving the way for studies of extensive non-Hermitian observable in quantum domain.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Stability and Generalization for Stochastic Recursive Momentum-based Algorithms for (Strongly-)Convex One to $K$-Level Stochastic Optimizations
Authors:
Xiaokang Pan,
Xingyu Li,
Jin Liu,
Tao Sun,
Kai Sun,
Lixing Chen,
Zhe Qu
Abstract:
STOchastic Recursive Momentum (STORM)-based algorithms have been widely developed to solve one to $K$-level ($K \geq 3$) stochastic optimization problems. Specifically, they use estimators to mitigate the biased gradient issue and achieve near-optimal convergence results. However, there is relatively little work on understanding their generalization performance, particularly evident during the tra…
▽ More
STOchastic Recursive Momentum (STORM)-based algorithms have been widely developed to solve one to $K$-level ($K \geq 3$) stochastic optimization problems. Specifically, they use estimators to mitigate the biased gradient issue and achieve near-optimal convergence results. However, there is relatively little work on understanding their generalization performance, particularly evident during the transition from one to $K$-level optimization contexts. This paper provides a comprehensive generalization analysis of three representative STORM-based algorithms: STORM, COVER, and SVMR, for one, two, and $K$-level stochastic optimizations under both convex and strongly convex settings based on algorithmic stability. Firstly, we define stability for $K$-level optimizations and link it to generalization. Then, we detail the stability results for three prominent STORM-based algorithms. Finally, we derive their excess risk bounds by balancing stability results with optimization errors. Our theoretical results provide strong evidence to complete STORM-based algorithms: (1) Each estimator may decrease their stability due to variance with its estimation target. (2) Every additional level might escalate the generalization error, influenced by the stability and the variance between its cumulative stochastic gradient and the true gradient. (3) Increasing the batch size for the initial computation of estimators presents a favorable trade-off, enhancing the generalization performance.
△ Less
Submitted 7 July, 2024;
originally announced July 2024.
-
Wi-Fi Beyond Communications: Experimental Evaluation of Respiration Monitoring and Motion Detection Using COTS Devices
Authors:
Jiuyu Liu,
Yi Ma,
Rahim Tafazolli
Abstract:
Wi-Fi sensing has become an attractive option for non-invasive monitoring of human activities and vital signs. This paper explores the feasibility of using state-of-the-art commercial off-the-shelf (COTS) devices for Wi-Fi sensing applications, particularly respiration monitoring and motion detection. We utilize the Intel AX210 network interface card (NIC) to transmit Wi-Fi signals in both 2.4 GHz…
▽ More
Wi-Fi sensing has become an attractive option for non-invasive monitoring of human activities and vital signs. This paper explores the feasibility of using state-of-the-art commercial off-the-shelf (COTS) devices for Wi-Fi sensing applications, particularly respiration monitoring and motion detection. We utilize the Intel AX210 network interface card (NIC) to transmit Wi-Fi signals in both 2.4 GHz and 6 GHz frequency bands. Our experiments rely on channel frequency response (CFR) and received signal strength indicator (RSSI) data, which are processed using a moving average algorithm to extract human behavior patterns. The experimental results demonstrate the effectiveness of our approach in capturing and representing human respiration and motion patterns. Furthermore, we compare the performance of Wi-Fi sensing across different frequency bands, highlighting the advantages of using higher frequencies for improved sensitivity and clarity. Our findings showcase the practicality of using COTS devices for Wi-Fi sensing and lay the groundwork for the development of non-invasive, contactless sensing systems. These systems have potential applications in various fields, including healthcare, smart homes, and Metaverse.
△ Less
Submitted 6 July, 2024;
originally announced July 2024.
-
Coupled Stochastic-Statistical Equations for Filtering Multiscale Turbulent Systems
Authors:
Di Qi,
Jian-Guo Liu
Abstract:
We present a new strategy for filtering high-dimensional multiscale systems characterized by high-order non-Gaussian statistics using observations from leading-order moments. A closed stochastic-statistical modeling framework suitable for systematic theoretical analysis and efficient numerical simulations is designed. Optimal filtering solutions are derived based on the explicit coupling structure…
▽ More
We present a new strategy for filtering high-dimensional multiscale systems characterized by high-order non-Gaussian statistics using observations from leading-order moments. A closed stochastic-statistical modeling framework suitable for systematic theoretical analysis and efficient numerical simulations is designed. Optimal filtering solutions are derived based on the explicit coupling structures of stochastic and statistical equations subject to linear operators, which satisfy an infinite-dimensional Kalman-Bucy filter with conditional Gaussian dynamics. To facilitate practical implementation, we develop a finite-dimensional stochastic filter model that approximates the optimal filter solution. We prove that this approximating filter effectively captures key non-Gaussian features, demonstrating consistent statistics with the optimal filter first in its analysis step update, then at the long-time limit guaranteeing stable convergence to the optimal filter. Finally, we build a practical ensemble filter algorithm based on the approximating filtering model, which enables accurate recovery of the true model statistics. The proposed modeling and filtering strategies are applicable to a wide range challenging problems in science and engineering, particularly for statistical prediction and uncertainty quantification of multiscale turbulent states.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Leveraging Data Mining, Active Learning, and Domain Adaptation in a Multi-Stage, Machine Learning-Driven Approach for the Efficient Discovery of Advanced Acidic Oxygen Evolution Electrocatalysts
Authors:
Rui Ding,
Jianguo Liu,
Kang Hua,
Xuebin Wang,
Xiaoben Zhang,
Minhua Shao,
Yuxin Chen,
Junhong Chen
Abstract:
Developing advanced catalysts for acidic oxygen evolution reaction (OER) is crucial for sustainable hydrogen production. This study introduces a novel, multi-stage machine learning (ML) approach to streamline the discovery and optimization of complex multi-metallic catalysts. Our method integrates data mining, active learning, and domain adaptation throughout the materials discovery process. Unlik…
▽ More
Developing advanced catalysts for acidic oxygen evolution reaction (OER) is crucial for sustainable hydrogen production. This study introduces a novel, multi-stage machine learning (ML) approach to streamline the discovery and optimization of complex multi-metallic catalysts. Our method integrates data mining, active learning, and domain adaptation throughout the materials discovery process. Unlike traditional trial-and-error methods, this approach systematically narrows the exploration space using domain knowledge with minimized reliance on subjective intuition. Then the active learning module efficiently refines element composition and synthesis conditions through iterative experimental feedback. The process culminated in the discovery of a promising Ru-Mn-Ca-Pr oxide catalyst. Our workflow also enhances theoretical simulations with domain adaptation strategy, providing deeper mechanistic insights aligned with experimental findings. By leveraging diverse data sources and multiple ML strategies, we establish an efficient pathway for electrocatalyst discovery and optimization. This comprehensive, data-driven approach represents a paradigm shift and potentially new benchmark in electrocatalysts research.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Amazing Things Come From Having Many Good Models
Authors:
Cynthia Rudin,
Chudi Zhong,
Lesia Semenova,
Margo Seltzer,
Ronald Parr,
Jiachang Liu,
Srikar Katta,
Jon Donnelly,
Harry Chen,
Zachery Boner
Abstract:
The Rashomon Effect, coined by Leo Breiman, describes the phenomenon that there exist many equally good predictive models for the same dataset. This phenomenon happens for many real datasets and when it does, it sparks both magic and consternation, but mostly magic. In light of the Rashomon Effect, this perspective piece proposes reshaping the way we think about machine learning, particularly for…
▽ More
The Rashomon Effect, coined by Leo Breiman, describes the phenomenon that there exist many equally good predictive models for the same dataset. This phenomenon happens for many real datasets and when it does, it sparks both magic and consternation, but mostly magic. In light of the Rashomon Effect, this perspective piece proposes reshaping the way we think about machine learning, particularly for tabular data problems in the nondeterministic (noisy) setting. We address how the Rashomon Effect impacts (1) the existence of simple-yet-accurate models, (2) flexibility to address user preferences, such as fairness and monotonicity, without losing performance, (3) uncertainty in predictions, fairness, and explanations, (4) reliable variable importance, (5) algorithm choice, specifically, providing advanced knowledge of which algorithms might be suitable for a given problem, and (6) public policy. We also discuss a theory of when the Rashomon Effect occurs and why. Our goal is to illustrate how the Rashomon Effect can have a massive impact on the use of machine learning for complex problems in society.
△ Less
Submitted 9 July, 2024; v1 submitted 5 July, 2024;
originally announced July 2024.
-
Proximal Point Method for Online Saddle Point Problem
Authors:
Qing-xin Meng,
Jian-wei Liu
Abstract:
This paper focuses on the online saddle point problem, which involves a sequence of two-player time-varying convex-concave games. Considering the nonstationarity of the environment, we adopt the duality gap and the dynamic Nash equilibrium regret as performance metrics for algorithm design. We present three variants of the proximal point method: the Online Proximal Point Method~(OPPM), the Optimis…
▽ More
This paper focuses on the online saddle point problem, which involves a sequence of two-player time-varying convex-concave games. Considering the nonstationarity of the environment, we adopt the duality gap and the dynamic Nash equilibrium regret as performance metrics for algorithm design. We present three variants of the proximal point method: the Online Proximal Point Method~(OPPM), the Optimistic OPPM~(OptOPPM), and the OptOPPM with multiple predictors. Each algorithm guarantees upper bounds for both the duality gap and dynamic Nash equilibrium regret, achieving near-optimality when measured against the duality gap. Specifically, in certain benign environments, such as sequences of stationary payoff functions, these algorithms maintain a nearly constant metric bound. Experimental results further validate the effectiveness of these algorithms. Lastly, this paper discusses potential reliability concerns associated with using dynamic Nash equilibrium regret as a performance metric.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Detecting the dark sector through scalar-induced gravitational waves
Authors:
Xiao-Bin Sui,
Jing Liu,
Xing-Yu Yang,
Rong-Gen Cai
Abstract:
We investigate the evolution of cosmological scalar perturbations in the case that the background radiation is weakly coupled to a light scalar field $φ$. The light scalar $φ$ is a homogeneous background field with a large initial value. In the radiation-dominated Universe, the coupling term introduces an effective mass to $φ$ and the background ultra-relativistic particles. The oscillations of…
▽ More
We investigate the evolution of cosmological scalar perturbations in the case that the background radiation is weakly coupled to a light scalar field $φ$. The light scalar $φ$ is a homogeneous background field with a large initial value. In the radiation-dominated Universe, the coupling term introduces an effective mass to $φ$ and the background ultra-relativistic particles. The oscillations of $φ$ result in the periodic change of the equation of state parameter and the sound speed, which provides a novel mechanism to amplify subhorizon scalar perturbations through parametric resonance. The amplification of scalar perturbations leads to a stochastic gravitational-waves background~(SGWB) expected to be observed by multiband gravitational wave observers. The observation of the SGWB helps to determine the initial value of $φ$ and the coupling strength of the interaction. This mechanism is generally applicable to the interactions that introduce an effective mass, and we take the interaction between $φ$ and electrons as a concrete example to illustrate the result. We find that under the condition that the coupling coefficient $λ=10^{-16}$ and the initial value $φ_i=10^{18}$ GeV, the resulting SGWB spectrum is expected to be observed by the future observers including LISA, $Taiji$, DECIGO and BBO.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Your Mega-Constellations Can Be Slim:A Cost-Effective Approach for Constructing Survivable and Performant LEO Satellite Networks
Authors:
Zeqi Lai,
Yibo Wang,
Hewu Li,
Qian Wu,
Qi Zhang,
Yunan Hou,
Jun Liu,
Yuanjie Li
Abstract:
In this paper, we investigate an important research problem facing the upcoming satellite Internet: from a network perspective, how many satellites exactly do we need to construct a survivable and performant LSN? To answer this question, we first formulate the survivable and performant LSN design (SPLD) problem, which aims to find the minimum number of needed satellites to construct an LSN that ca…
▽ More
In this paper, we investigate an important research problem facing the upcoming satellite Internet: from a network perspective, how many satellites exactly do we need to construct a survivable and performant LSN? To answer this question, we first formulate the survivable and performant LSN design (SPLD) problem, which aims to find the minimum number of needed satellites to construct an LSN that can provide sufficient amount of redundant paths, required link capacity and acceptable latency for traffic carried by the LSN. Second, to efficiently solve the tricky SPLD problem, we propose MEGAREDUCE, a requirement-driven constellation optimization mechanism, which can calculate feasible solutions for SPLD in polynomial time. Finally, we conduct extensive trace-driven simulations to verify MEGAREDUCE's cost-effectiveness in constructing survivable and performant LSNs on demand, and showcase how MEGAREDUCE can help optimize the incremental deployment and long-term maintenance of future satellite Internet.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Discovery of a dusty yellow supergiant progenitor for the Type IIb SN 2017gkk
Authors:
Zexi Niu,
Ning-Chen Sun,
Jifeng Liu
Abstract:
Type IIb supernovae are important subclass of stripped-envelope supernovae (SNe), which show H lines only at early times. Their progenitors are believed to contain a low-mass H envelope before explosion. This work reports the discovery of a progenitor candidate in pre-explosion Hubble Space Telescope images for the Type IIb SN~2017gkk. With detailed analysis of its spectral energy distribution and…
▽ More
Type IIb supernovae are important subclass of stripped-envelope supernovae (SNe), which show H lines only at early times. Their progenitors are believed to contain a low-mass H envelope before explosion. This work reports the discovery of a progenitor candidate in pre-explosion Hubble Space Telescope images for the Type IIb SN~2017gkk. With detailed analysis of its spectral energy distribution and local environment, we suggest that the progenitor is most likely a yellow supergiant with significant circumstellar extinction and has an initial mass of about 16 $M_\odot$, effective temperature log($T_{\rm eff}/K)=3.72\pm0.08$ and luminosity log($L/L_{\odot})=5.17\pm0.04$. This progenitor is not massive enough to strip envelope through stellar wind, and it supports an interacting binary progenitor channel and adds to the growing list of direct progenitor detections for Type~IIb SNe. Future late-time observations will confirm whether this progenitor candidate has disappeared and reveal the putative binary companion that has survived the explosion.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.
-
Augmenting LLMs to Repair Obsolete Test Cases with Static Collector and Neural Reranker
Authors:
Jun Liu,
Jiwei Yan,
Yuanyuan Xie,
Jun Yan,
Jian Zhang
Abstract:
During software evolution, it is advocated that test code should co-evolve with production code. In real development scenarios, test updating may lag behind production code changing, which may cause the project to fail to compile or bring other troubles. Existing techniques based on pre-trained language models can be adopted to repair obsolete tests caused by such unsynchronized code changes, espe…
▽ More
During software evolution, it is advocated that test code should co-evolve with production code. In real development scenarios, test updating may lag behind production code changing, which may cause the project to fail to compile or bring other troubles. Existing techniques based on pre-trained language models can be adopted to repair obsolete tests caused by such unsynchronized code changes, especially syntactic-related ones. However, the lack of target-oriented contextual information affects repair accuracy on large-scale projects. Starting from an obsoleted test, the key challenging task is precisely identifying and constructing Test-Repair-Oriented Contexts (TROCtx) from the whole repository within a limited token size.
In this paper, we propose SynBCIATR (Syntactic-Breaking-Change-Induced Automated Test Repair), a novel approach to automatically repair obsolete test cases via precise and concise TROCtx construction. Inspired by developers' programming practices of the task, we design three types of TROCtx: class contexts, usage contexts, and environment contexts. For every type of TROCtx, SynBCIATR automatically collects the changed-token-related code information through static analysis techniques. Then it generates reranking queries to identify the most relevant TROCtxs, which will be taken as the repair-required key context and be input to the Large Language Model for the final test repair.
To evaluate the effectiveness of SynBCIATR, we construct a benchmark dataset that contains diverse syntactic breaking changes. The experimental results show that SynBCIATR outperforms baseline approaches both on textual- and intent-matching metrics. With the augmentation of TROCtx constructed by SynBCIATR, hallucinations are reduced by 57.1%.
△ Less
Submitted 4 July, 2024;
originally announced July 2024.