Skip to main content

Showing 1–50 of 4,609 results for author: Wang, D

  1. arXiv:2407.09007  [pdf, other

    cs.CL

    Benchmarking Language Model Creativity: A Case Study on Code Generation

    Authors: Yining Lu, Dixuan Wang, Tianjian Li, Dongwei Jiang, Daniel Khashabi

    Abstract: As LLMs become increasingly prevalent, it is interesting to consider how ``creative'' these models can be. From cognitive science, creativity consists of at least two key characteristics: \emph{convergent} thinking (purposefulness to achieve a given goal) and \emph{divergent} thinking (adaptability to new environments or constraints) \citep{runco2003critical}. In this work, we introduce a framewor… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  2. arXiv:2407.08948  [pdf, other

    eess.IV cs.CV

    Symmetry Awareness Encoded Deep Learning Framework for Brain Imaging Analysis

    Authors: Yang Ma, Dongang Wang, Peilin Liu, Lynette Masters, Michael Barnett, Weidong Cai, Chenyu Wang

    Abstract: The heterogeneity of neurological conditions, ranging from structural anomalies to functional impairments, presents a significant challenge in medical imaging analysis tasks. Moreover, the limited availability of well-annotated datasets constrains the development of robust analysis models. Against this backdrop, this study introduces a novel approach leveraging the inherent anatomical symmetrical… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: MICCAI 2024

    ACM Class: I.2.10; I.4.10

  3. arXiv:2407.08845  [pdf, ps, other

    cs.DS

    Optimal Protocols for 2-Party Contention Resolution

    Authors: Dingyu Wang

    Abstract: \emph{Contention Resolution} is a fundamental symmetry-breaking problem in which $n$ devices must acquire temporary and exclusive access to some \emph{shared resource}, without the assistance of a mediating authority. For example, the $n$ devices may be sensors that each need to transmit a single packet of data over a broadcast channel. In each time step, devices can (probabilistically) choose to… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: full version of the corresponding conference version

  4. arXiv:2407.08547  [pdf

    cond-mat.supr-con

    Necklace-like pattern of vortex bound states

    Authors: Zhiyong Hou, Kailun Chen, Wenshan Hong, Da Wang, Wen Duan, Huan Yang, Shiliang Li, Huiqian Luo, Qiang-Hua Wang, Tao Xiang, Hai-Hu Wen

    Abstract: Vortex is a topological defect in the superconducting condensate when a magnetic field is applied to a type-II superconductor, as elucidated by the Ginzburg-Landau theory. Due to the confinement of the quasiparticles by a vortex, it exhibits a circular shaped pattern of bound states with discrete energy levels, as predicted by the Caroli-de Gennes-Matricon theory in 1964. Here, however, we report… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 29 pages total; 16 pages of main text with 5 figures, 13 pages of supplementary materials with 10 figures

  5. arXiv:2407.08514  [pdf, other

    cs.CV

    Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems

    Authors: Yuxin Cao, Yumeng Zhu, Derui Wang, Sheng Wen, Minhui Xue, Jin Lu, Hao Ge

    Abstract: Face recognition pipelines have been widely deployed in various mission-critical systems in trust, equitable and responsible AI applications. However, the emergence of adversarial attacks has threatened the security of the entire recognition pipeline. Despite the sheer number of attack methods proposed for crafting adversarial examples in both digital and physical forms, it is never an easy task t… ▽ More

    Submitted 11 July, 2024; originally announced July 2024.

    Comments: 19 pages, 12 figures

  6. arXiv:2407.08022  [pdf, other

    cs.GT cs.AI cs.LG

    Deep Reinforcement Learning for Sequential Combinatorial Auctions

    Authors: Sai Srivatsa Ravindranath, Zhe Feng, Di Wang, Manzil Zaheer, Aranyak Mehta, David C. Parkes

    Abstract: Revenue-optimal auction design is a challenging problem with significant theoretical and practical implications. Sequential auction mechanisms, known for their simplicity and strong strategyproofness guarantees, are often limited by theoretical results that are largely existential, except for certain restrictive settings. Although traditional reinforcement learning methods such as Proximal Policy… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  7. arXiv:2407.07651  [pdf, other

    hep-ex physics.data-an

    Study of the decay and production properties of $D_{s1}(2536)$ and $D_{s2}^*(2573)$

    Authors: M. Ablikim, M. N. Achasov, P. Adlarson, O. Afedulidis, X. C. Ai, R. Aliberti, A. Amoroso, Q. An, Y. Bai, O. Bakina, I. Balossino, Y. Ban, H. -R. Bao, V. Batozskaya, K. Begzsuren, N. Berger, M. Berlowski, M. Bertani, D. Bettoni, F. Bianchi, E. Bianco, A. Bortone, I. Boyko, R. A. Briere, A. Brueggemann , et al. (645 additional authors not shown)

    Abstract: The $e^+e^-\rightarrow D_s^+D_{s1}(2536)^-$ and $e^+e^-\rightarrow D_s^+D^*_{s2}(2573)^-$ processes are studied using data samples collected with the BESIII detector at center-of-mass energies from 4.530 to 4.946~GeV. The absolute branching fractions of $D_{s1}(2536)^- \rightarrow \bar{D}^{*0}K^-$ and $D_{s2}^*(2573)^- \rightarrow \bar{D}^0K^-$ are measured for the first time to be… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  8. arXiv:2407.07476  [pdf, other

    cs.DC

    A Transverse-Read-assisted Valid-Bit Collection to Accelerate Stochastic Conmputing MAC for Energy-Efficient in-RTM DNNs

    Authors: Jihe Wang, Zhiying Zhang, Xingwu Dong, Danghui Wang

    Abstract: It looks very attractive to coordinate racetrack-memory(RM) and stochastic-computing (SC) jointly to build an ultra-low power neuron-architecture.However,the above combination has always been questioned in a fatal weakness that the narrow bit-view of the RM-MTJ structure,a.k.a.shift-and-access pattern,cannot physically match the great throughput of direct-stored stochastic sequences.Fortunately,a… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

  9. arXiv:2407.07304  [pdf, other

    cs.AI

    Inference Performance Optimization for Large Language Models on CPUs

    Authors: Pujiang He, Shan Zhou, Wenhuan Huang, Changqing Li, Duyi Wang, Bin Guo, Chen Meng, Sheng Gui, Weifei Yu, Yi Xie

    Abstract: Large language models (LLMs) have shown exceptional performance and vast potential across diverse tasks. However, the deployment of LLMs with high performance in low-resource environments has garnered significant attention in the industry. When GPU hardware resources are limited, we can explore alternative options on CPUs. To mitigate the financial burden and alleviate constraints imposed by hardw… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: 5 pages, 6 figure, ICML 2024 on Foundation Models in the Wild

  10. arXiv:2407.07099  [pdf, other

    cs.CL cs.AI cs.GT cs.LG

    Nash CoT: Multi-Path Inference with Preference Equilibrium

    Authors: Ziqi Zhang, Cunxiang Wang, Xiong Xiao, Yue Zhang, Donglin Wang

    Abstract: Chain-of-thought (CoT) prompting has emerged as a powerful technique for enhancing the reasoning capabilities of Large Language Models (LLMs) on complex problems. Among CoT-related studies, self-consistency (Multi-path inference with answer filtering through voting) involves generating multiple reasoning paths using the CoT framework and then selecting the most frequently produced outputs standing… ▽ More

    Submitted 18 June, 2024; originally announced July 2024.

  11. arXiv:2407.06714  [pdf, other

    cs.CV

    Improving the Transferability of Adversarial Examples by Feature Augmentation

    Authors: Donghua Wang, Wen Yao, Tingsong Jiang, Xiaohu Zheng, Junqi Wu, Xiaoqian Chen

    Abstract: Despite the success of input transformation-based attacks on boosting adversarial transferability, the performance is unsatisfying due to the ignorance of the discrepancy across models. In this paper, we propose a simple but effective feature augmentation attack (FAUG) method, which improves adversarial transferability without introducing extra computation costs. Specifically, we inject the random… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: 19 pages, 4 figures, 4 tables

  12. arXiv:2407.06688  [pdf, other

    cs.CV

    Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization

    Authors: Donghua Wang, Wen Yao, Tingsong Jiang, Chao Li, Xiaoqian Chen

    Abstract: Object detectors have demonstrated vulnerability to adversarial examples crafted by small perturbations that can deceive the object detector. Existing adversarial attacks mainly focus on white-box attacks and are merely valid at a specific viewpoint, while the universal multi-view black-box attack is less explored, limiting their generalization in practice. In this paper, we propose a novel univer… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: 12 pages, 13 figures, 5 tables

  13. arXiv:2407.06649  [pdf, ps, other

    cs.SC math.AC

    On the equivalence problem of Smith forms for multivariate polynomial matrices

    Authors: Dong Lu, Dingkang Wang, Fanghui Xiao, Xiaopeng Zheng

    Abstract: This paper delves into the equivalence problem of Smith forms for multivariate polynomial matrices. Generally speaking, multivariate ($n \geq 2$) polynomial matrices and their Smith forms may not be equivalent. However, under certain specific condition, we derive the necessary and sufficient condition for their equivalence. Let $F\in K[x_1,\ldots,x_n]^{l\times m}$ be of rank $r$,… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

  14. arXiv:2407.06078  [pdf, ps, other

    cs.SD

    Few-Shot Keyword Spotting from Mixed Speech

    Authors: Junming Yuan, Ying Shi, LanTian Li, Dong Wang, Askar Hamdulla

    Abstract: Few-shot keyword spotting (KWS) aims to detect unknown keywords with limited training samples. A commonly used approach is the pre-training and fine-tuning framework. While effective in clean conditions, this approach struggles with mixed keyword spotting -- simultaneously detecting multiple keywords blended in an utterance, which is crucial in real-world applications. Previous research has propos… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: accepted by INTERSPEECH 2024

  15. arXiv:2407.05873  [pdf, other

    eess.SP cs.IT

    Receiver Selection and Transmit Beamforming for Multi-static Integrated Sensing and Communications

    Authors: Dan Wang, Yuanming Tian, Chuan Huang, Hao Chen, Xiaodong Xu, Ping Zhang

    Abstract: Next-generation wireless networks are expected to develop a novel paradigm of integrated sensing and communications (ISAC) to enable both the high-accuracy sensing and high-speed communications. However, conventional mono-static ISAC systems, which simultaneously transmit and receive at the same equipment, may suffer from severe self-interference, and thus significantly degrade the system performa… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

  16. arXiv:2407.05840  [pdf, other

    cs.ET physics.optics

    A 103-TOPS/mm$^2$ Integrated Photonic Computing Engine Enabling Next-Generation Reservoir Computing

    Authors: Dongliang Wang, Yikun Nie, Gaolei Hu, Hon Ki Tsang, Chaoran Huang

    Abstract: Reservoir computing (RC) is a leading machine learning algorithm for information processing due to its rich expressiveness. A new RC paradigm has recently emerged, showcasing superior performance and delivering more interpretable results with shorter training data sets and training times, representing the next generation of RC computing. This work presents the first realization of a high-speed nex… ▽ More

    Submitted 31 May, 2024; originally announced July 2024.

  17. arXiv:2407.05468  [pdf, other

    physics.app-ph

    Non-contact excitation of multi-GHz lithium niobate electromechanical resonators

    Authors: Danqing Wang, Jiacheng Xie, Yu Guo, Mohan Shen, Hong X. Tang

    Abstract: The demand for high-performance electromechanical resonators is ever-growing across diverse applications, ranging from sensing and time-keeping to advanced communication devices. Among the electromechanical materials being explored, thin-film lithium niobate stands out for its strong piezoelectric properties and low acoustic loss. However, in nearly all existing lithium niobate electromechanical d… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

    Comments: 6 pages, 4 figures

  18. arXiv:2407.05165  [pdf, other

    cs.SE

    Feedback-Driven Automated Whole Bug Report Reproduction for Android Apps

    Authors: Dingbang Wang, Yu Zhao, Sidong Feng, Zhaoxu Zhang, William G. J. Halfond, Chunyang Chen, Xiaoxia Sun, Jiangfan Shi, Tingting Yu

    Abstract: In software development, bug report reproduction is a challenging task. This paper introduces ReBL, a novel feedback-driven approach that leverages GPT-4, a large-scale language model, to automatically reproduce Android bug reports. Unlike traditional methods, ReBL bypasses the use of Step to Reproduce (S2R) entities. Instead, it leverages the entire textual bug report and employs innovative promp… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

    Comments: Accepted by ISSTA 2024

  19. arXiv:2407.05112  [pdf, other

    cs.CR cs.AI

    Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning

    Authors: Binhao Ma, Tianhang Zheng, Hongsheng Hu, Di Wang, Shuo Wang, Zhongjie Ba, Zhan Qin, Kui Ren

    Abstract: Machine learning models trained on vast amounts of real or synthetic data often achieve outstanding predictive performance across various domains. However, this utility comes with increasing concerns about privacy, as the training data may include sensitive information. To address these concerns, machine unlearning has been proposed to erase specific data samples from models. While some unlearning… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  20. arXiv:2407.04976  [pdf, other

    cs.DS

    Congestion-Approximators from the Bottom Up

    Authors: Jason Li, Satish Rao, Di Wang

    Abstract: We develop a novel algorithm to construct a congestion-approximator with polylogarithmic quality on a capacitated, undirected graph in nearly-linear time. Our approach is the first *bottom-up* hierarchical construction, in contrast to previous *top-down* approaches including that of Racke, Shah, and Taubig (SODA 2014), the only other construction achieving polylogarithmic quality that is implement… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

    Comments: 46 pages

  21. arXiv:2407.04931  [pdf, other

    cs.DS math.PR

    Universal Perfect Samplers for Incremental Streams

    Authors: Seth Pettie, Dingyu Wang

    Abstract: If $G : \mathbb{R}_+ \to \mathbb{R}_+$, the $G$-moment of a vector $\mathbf{x}\in\mathbb{R}_+^n$ is $G(\mathbf{x}) = \sum_{v\in[n]} G(\mathbf{x}(v))$ and the $G$-sampling problem is to select an index $v_*\in [n]$ according to its contribution to the $G$-moment, i.e., such that $\Pr(v_*=v) = G(\mathbf{x}(v))/G(\mathbf{x})$. Approximate $G$-samplers may introduce multiplicative and/or additive erro… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  22. arXiv:2407.04929  [pdf, other

    cs.RO

    Toward Precise Robotic Weed Flaming Using a Mobile Manipulator with a Flamethrower

    Authors: Di Wang, Chengsong Hu, Shuangyu Xie, Joe Johnson, Hojun Ji, Yingtao Jiang, Muthukumar Bagavathiannan, Dezhen Song

    Abstract: Robotic weed flaming is a new and environmentally friendly approach to weed removal in the agricultural field. Using a mobile manipulator equipped with a flamethrower, we design a new system and algorithm to enable effective weed flaming, which requires robotic manipulation with a soft and deformable end effector, as the thermal coverage of the flame is affected by dynamic or unknown environmental… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: IROS 2024

  23. arXiv:2407.04466  [pdf, other

    cs.CL

    Using LLMs to label medical papers according to the CIViC evidence model

    Authors: Markus Hisch, Xing David Wang

    Abstract: We introduce the sequence classification problem CIViC Evidence to the field of medical NLP. CIViC Evidence denotes the multi-label classification problem of assigning labels of clinical evidence to abstracts of scientific papers which have examined various combinations of genomic variants, cancer types, and treatment approaches. We approach CIViC Evidence using different language models: We fine-… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  24. arXiv:2407.04404  [pdf

    cs.AR

    Multi-Antenna Technology for 6G Integrated Sensing and Communication

    Authors: Yong Zeng, Zhenjun Dong, Huizhi Wang, Lipeng Zhu, Ziyao Hong, Qingji Jiang, Dongming Wang, Shi Jin, Rui Zhang

    Abstract: By deploying antenna arrays at the transmitter/receiver to provide additional spatial-domain degrees of freedom (DoFs), multi-antenna technology greatly improves the reliability and efficiency of wireless communication. Meanwhile, the application of multi-antenna technology in the radar field has achieved spatial angle resolution and improved sensing DoF, thus significantly enhancing wireless sens… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

    Comments: in Chinese language

  25. arXiv:2407.04267  [pdf, other

    cs.DC

    A High-Quality Workflow for Multi-Resolution Scientific Data Reduction and Visualization

    Authors: Daoce Wang, Pascal Grosset, Jesus Pulido, Tushar M. Athawale, Jiannan Tian, Kai Zhao, Zarija Lukić, Axel Huebl, Zhe Wang, James Ahrens, Dingwen Tao

    Abstract: Multi-resolution methods such as Adaptive Mesh Refinement (AMR) can enhance storage efficiency for HPC applications generating vast volumes of data. However, their applicability is limited and cannot be universally deployed across all applications. Furthermore, integrating lossy compression with multi-resolution techniques to further boost storage efficiency encounters significant barriers. To thi… ▽ More

    Submitted 11 July, 2024; v1 submitted 5 July, 2024; originally announced July 2024.

    Comments: accepted by SC '24

  26. arXiv:2407.04232  [pdf

    q-bio.QM physics.bio-ph q-bio.BM q-bio.SC

    A Unified Intracellular pH Landscape with SITE-pHorin: a Quantum-Entanglement-Enhanced pH Probe

    Authors: Shu-Ang Li, Xiao-Yan Meng, Su Zhang, Ying-Jie Zhang, Run-Zhou Yang, Dian-Dian Wang, Yang Yang, Pei-Pei Liu, Jian-Sheng Kang

    Abstract: An accurate map of intracellular organelle pH is crucial for comprehending cellular metabolism and organellar functions. However, a unified intracellular pH spectrum using a single probe is still lack. Here, we developed a novel quantum entanglement-enhanced pH-sensitive probe called SITE-pHorin, which featured a wide pH-sensitive range and ratiometric quantitative measurement capabilities. Subseq… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: 64 pages, 7 figures, the supplemental material contains 13 supplemental figures and 4 supplemental tables

  27. arXiv:2407.03966  [pdf, other

    cs.SD cs.AI eess.AS

    Serialized Output Training by Learned Dominance

    Authors: Ying Shi, Lantian Li, Shi Yin, Dong Wang, Jiqing Han

    Abstract: Serialized Output Training (SOT) has showcased state-of-the-art performance in multi-talker speech recognition by sequentially decoding the speech of individual speakers. To address the challenging label-permutation issue, prior methods have relied on either the Permutation Invariant Training (PIT) or the time-based First-In-First-Out (FIFO) rule. This study presents a model-based serialization st… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: accepted by INTERSPEECH 2024

  28. arXiv:2407.03783  [pdf, other

    hep-ex

    Evidence of $h_{b}(\text{2P}) \to Υ(\text{1S})η$ decay and search for $h_{b}(\text{1P,2P}) \to Υ(\text{1S})π^0$ with the Belle detector

    Authors: Belle Collaboration, E. Kovalenko, I. Adachi, H. Aihara, D. M. Asner, T. Aushev, R. Ayad, V. Babu, Sw. Banerjee, K. Belous, J. Bennett, M. Bessner, T. Bilka, D. Biswas, A. Bobrov, D. Bodrov, A. Bondar, A. Bozek, M. Bračko, P. Branchini, T. E. Browder, A. Budano, M. Campajola, M. -C. Chang, B. G. Cheon , et al. (142 additional authors not shown)

    Abstract: We report the first evidence for the $h_{b}(\text{2P}) \to Υ(\text{1S})η$ transition with a significance of $3.5$ standard deviations. The decay branching fraction is measured to be $\mathcal{B}[h_{b}(\text{2P}) \to Υ(\text{1S})η]=(7.1 ~^{+3.7} _{-3.2}\pm 0.8)\times10^{-3}$, which is noticeably smaller than expected. We also set upper limits on $π^0$ transitions of… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: to be submitted to PRL

    Report number: Belle Preprint 2024-03, KEK Preprint 2024-03

  29. arXiv:2407.03647  [pdf, other

    math.OC cs.AI

    WANCO: Weak Adversarial Networks for Constrained Optimization problems

    Authors: Gang Bao, Dong Wang, Boyi Zou

    Abstract: This paper focuses on integrating the networks and adversarial training into constrained optimization problems to develop a framework algorithm for constrained optimization problems. For such problems, we first transform them into minimax problems using the augmented Lagrangian method and then use two (or several) deep neural networks(DNNs) to represent the primal and dual variables respectively.… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: 24 pages, 18 figures

  30. arXiv:2407.03577  [pdf, other

    astro-ph.CO gr-qc hep-ph hep-th

    Evidence for Inflation

    Authors: Deng Wang

    Abstract: Inflation as the leading paradigm depicting the very early universe physics could leave imprints on the cosmic microwave background (CMB) radiation. Using currently available CMB observations, we give the first direct evidence of inflation. We discuss the theoretical implications of our results including the energy scale of inflation, inflaton field excursion, Hubble expansion rate during inflatio… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

    Comments: 4.5 pages, 4 figs

  31. arXiv:2407.03531  [pdf, other

    cs.RO

    OrbitGrasp: $SE(3)$-Equivariant Grasp Learning

    Authors: Boce Hu, Xupeng Zhu, Dian Wang, Zihao Dong, Haojie Huang, Chenghao Wang, Robin Walters, Robert Platt

    Abstract: While grasp detection is an important part of any robotic manipulation pipeline, reliable and accurate grasp detection in $SE(3)$ remains a research challenge. Many robotics applications in unstructured environments such as the home or warehouse would benefit a lot from better grasp performance. This paper proposes a novel framework for detecting $SE(3)$ grasp poses based on point cloud input. Our… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  32. arXiv:2407.02899  [pdf, other

    hep-ex

    Measurement of the branching fraction of the decay $J/ψ\to p \bar{p} η$

    Authors: BESIII Collaboration, M. Ablikim, M. N. Achasov, P. Adlarson, O. Afedulidis, X. C. Ai, R. Aliberti, A. Amoroso, Q. An, Y. Bai, O. Bakina, I. Balossino, Y. Ban, H. -R. Bao, V. Batozskaya, K. Begzsuren, N. Berger, M. Berlowski, M. Bertani, D. Bettoni, F. Bianchi, E. Bianco, A. Bortone, I. Boyko, R. A. Briere , et al. (639 additional authors not shown)

    Abstract: A high precision measurement of the branching fraction of the decay $J/ψ\to p \bar{p} η$ is performed using $(10 087 \pm 44) \times 10^6$ $J/ψ$ events recorded by the {BESIII} detector at the {BEPCII} storage ring. The branching fractions of the two decays $J/ψ\to p \bar{p} η(η\to γγ)$ and $J/ψ\to p \bar{p} η(η\to π^+ π^- π^0)$ are measured individually to be… ▽ More

    Submitted 3 July, 2024; originally announced July 2024.

  33. arXiv:2407.02781  [pdf, other

    hep-ph hep-ex

    Unveiling the Unexplored Decay Mode of a Light Charged Higgs Boson to an Off-Shell Top Quark and a Bottom Quark

    Authors: Jinheung Kim, Soojin Lee, Prasenjit Sanyal, Jeonghyeon Song, Daohan Wang

    Abstract: The charged Higgs boson ($H^\pm$) with a mass below the top quark mass remains a viable possibility within the type-I two-Higgs-doublet model under current constraints. While previous LHC searches have primarily focused on the $H^\pm\toτν$ decay mode, the decay channel into an off-shell top quark and a bottom quark, $H^\pm \rightarrow t^*b$, is leading or subleading for $H^\pm$ masses between 130… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

    Comments: 31 pages with 8 figures and 4 tables

  34. arXiv:2407.02714  [pdf, other

    astro-ph.CO gr-qc hep-ph hep-th

    Evidence for Primordial Gravitational Waves

    Authors: Deng Wang

    Abstract: Primordial gravitational waves have crucial implications for the origin of the universe and fundamental physics. Using currently available cosmic microwave background data from Planck, WMAP, ACT and SPT separately or their combinations with BK18 B-mode polarization and DESI observations, we find the evidence of primordial gravitational waves at beyond the $5\,σ$ confidence level.

    Submitted 2 July, 2024; originally announced July 2024.

  35. arXiv:2407.01909  [pdf, other

    cs.CL cs.SD eess.AS

    Pinyin Regularization in Error Correction for Chinese Speech Recognition with Large Language Models

    Authors: Zhiyuan Tang, Dong Wang, Shen Huang, Shidong Shang

    Abstract: Recent studies have demonstrated the efficacy of large language models (LLMs) in error correction for automatic speech recognition (ASR). However, much of the research focuses on the English language. This paper redirects the attention to Chinese. Firstly, we construct a specialized benchmark dataset aimed at error correction for Chinese ASR with 724K hypotheses-transcription pairs, named the Chin… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

    Comments: Interspeech 2024

  36. arXiv:2407.01812  [pdf, other

    cs.RO cs.LG

    Equivariant Diffusion Policy

    Authors: Dian Wang, Stephen Hart, David Surovik, Tarik Kelestemur, Haojie Huang, Haibo Zhao, Mark Yeatman, Jiuguang Wang, Robin Walters, Robert Platt

    Abstract: Recent work has shown diffusion models are an effective approach to learning the multimodal distributions arising from demonstration data in behavior cloning. However, a drawback of this approach is the need to learn a denoising function, which is significantly more complex than learning an explicit policy. In this work, we propose Equivariant Diffusion Policy, a novel diffusion policy learning me… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  37. arXiv:2407.01251  [pdf, other

    cs.CR cs.AI

    QUEEN: Query Unlearning against Model Extraction

    Authors: Huajie Chen, Tianqing Zhu, Lefeng Zhang, Bo Liu, Derui Wang, Wanlei Zhou, Minhui Xue

    Abstract: Model extraction attacks currently pose a non-negligible threat to the security and privacy of deep learning models. By querying the model with a small dataset and usingthe query results as the ground-truth labels, an adversary can steal a piracy model with performance comparable to the original model. Two key issues that cause the threat are, on the one hand, accurate and unlimited queries can be… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  38. arXiv:2407.01131  [pdf, other

    cs.CV

    M$^2$IST: Multi-Modal Interactive Side-Tuning for Memory-efficient Referring Expression Comprehension

    Authors: Xuyang Liu, Ting Liu, Siteng Huang, Yue Hu, Quanjun Yin, Donglin Wang, Honggang Chen

    Abstract: Referring expression comprehension (REC) is a vision-language task to locate a target object in an image based on a language expression. Fully fine-tuning general-purpose pre-trained models for REC yields impressive performance but becomes increasingly costly. Parameter-efficient transfer learning (PETL) methods have shown strong performance with fewer tunable parameters. However, applying PETL to… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  39. arXiv:2407.00995  [pdf, other

    cs.CY eess.SY physics.app-ph

    Data on the Move: Traffic-Oriented Data Trading Platform Powered by AI Agent with Common Sense

    Authors: Yi Yu, Shengyue Yao, Tianchen Zhou, Yexuan Fu, Jingru Yu, Ding Wang, Xuhong Wang, Cen Chen, Yilun Lin

    Abstract: In the digital era, data has become a pivotal asset, advancing technologies such as autonomous driving. Despite this, data trading faces challenges like the absence of robust pricing methods and the lack of trustworthy trading mechanisms. To address these challenges, we introduce a traffic-oriented data trading platform named Data on The Move (DTM), integrating traffic simulation, data trading, an… ▽ More

    Submitted 1 July, 2024; originally announced July 2024.

  40. arXiv:2407.00893  [pdf, ps, other

    math.NA

    Mittag-Leffler stability of complete monotonicity-preserving schemes for time-dependent coefficients sub-diffusion equations

    Authors: Wen Dong, Dongling Wang

    Abstract: A key characteristic of the anomalous sub-solution equation is that the solution exhibits algebraic decay rate over long time intervals, which is often refered to the Mittag-Leffler type stability. For a class of power nonlinear sub-diffusion models with variable coefficients, we prove that their solutions have Mittag-Leffler stability when the source functions satisfy natural decay assumptions. T… ▽ More

    Submitted 30 June, 2024; originally announced July 2024.

  41. arXiv:2407.00879  [pdf, ps, other

    hep-ex

    Study of $χ_{bJ}(2P)\toωΥ(1S)$ at Belle

    Authors: Belle Collaboration, Z. S. Stottler, T. K. Pedlar, B. G. Fulsom, I. Adachi, K. Adamczyk, H. Aihara, S. Al Said, D. M. Asner, H. Atmacan, T. Aushev, R. Ayad, V. Babu, Sw. Banerjee, M. Bauer, P. Behera, K. Belous, J. Bennett, F. Bernlochner, M. Bessner, T. Bilka, D. Biswas, A. Bobrov, D. Bodrov, G. Bonvicini , et al. (157 additional authors not shown)

    Abstract: We report a study of the hadronic transitions $χ_{bJ}(2P)\toωΥ(1S)$, with $ω\toπ^{+}π^{-}π^{0}$, using $28.2\times10^6~Υ(3S)$ mesons recorded by the Belle detector. We present the first evidence for the near--threshold transition $χ_{b0}(2P)\toωΥ(1S)$, the analog of the charm sector decay $χ_{c1}(3872)\toωJ/ψ$, with a branching fraction of… ▽ More

    Submitted 8 July, 2024; v1 submitted 30 June, 2024; originally announced July 2024.

    Comments: 6 pages, 2 figures

    Report number: Belle Preprint: 2024-05; KEK Preprint: 2024-10

  42. arXiv:2407.00572  [pdf, ps, other

    math.NA

    Convergence analysis of exponential time differencing scheme for the nonlocal Cahn-Hilliard equation

    Authors: Danni Zhang, Dongling Wang

    Abstract: In this paper, we present a rigorous proof of the convergence of first order and second order exponential time differencing (ETD) schemes for solving the nonlocal Cahn-Hilliard (NCH) equation. The spatial discretization employs the Fourier spectral collocation method, while the time discretization is implemented using ETD-based multistep schemes. The absence of a higher-order diffusion term in the… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

  43. arXiv:2407.00440  [pdf

    physics.optics physics.app-ph

    Three-dimensional non-reciprocal transport in photonic topological heterostructure of arbitrary shape

    Authors: Mudi Wang, Ruo-Yang Zhang, Chenyu Zhang, Haoran Xue, Hongwei Jia, Jing Hu, Dongyang Wang, Tianshu Jiang, C. T. Chan

    Abstract: Electromagnetic wave propagation in three-dimensional space typically suffers omnidirectional scattering when encountering obstacles. In this study, we employed Chern vectors to construct a topological heterostructure, where large-volume non-reciprocal topological transport in three-dimension is achieved. The shape of the cross-section in the heterostructure can be arbitrary designed, and we exper… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: 17 pages, 3 figures

  44. arXiv:2407.00290  [pdf, other

    cs.RO

    Variable Time Step Reinforcement Learning for Robotic Applications

    Authors: Dong Wang, Giovanni Beltrame

    Abstract: Traditional reinforcement learning (RL) generates discrete control policies, assigning one action per cycle. These policies are usually implemented as in a fixed-frequency control loop. This rigidity presents challenges as optimal control frequency is task-dependent; suboptimal frequencies increase computational demands and reduce exploration efficiency. Variable Time Step Reinforcement… ▽ More

    Submitted 28 June, 2024; originally announced July 2024.

  45. arXiv:2407.00285  [pdf, other

    physics.atom-ph hep-ex nucl-ex

    Imaging of single barium atoms in a second matrix site in solid xenon for barium tagging in a $^{136}$Xe double beta decay experiment

    Authors: M. Yvaine, D. Fairbank, J. Soderstrom, C. Taylor, J. Stanley, T. Walton, C. Chambers, A. Iverson, W. Fairbank, S. Al Kharusi, A. Amy, E. Angelico, A. Anker, I. J. Arnquist, A. Atencio, J. Bane, V. Belov, E. P. Bernard, T. Bhatta, A. Bolotnikov, J. Breslin, P. A. Breur, J. P. Brodsky, E. Brown, T. Brunner , et al. (112 additional authors not shown)

    Abstract: Neutrinoless double beta decay is one of the most sensitive probes for new physics beyond the Standard Model of particle physics. One of the isotopes under investigation is $^{136}$Xe, which would double beta decay into $^{136}$Ba. Detecting the single $^{136}$Ba daughter provides a sort of ultimate tool in the discrimination against backgrounds. Previous work demonstrated the ability to perform s… ▽ More

    Submitted 28 June, 2024; originally announced July 2024.

    Comments: 9 pages, 8 figures

  46. arXiv:2407.00136  [pdf, other

    hep-ex

    Observation of the Electromagnetic Dalitz Transition $h_c \rightarrow e^+e^-η_c$

    Authors: BESIII Collaboration, M. Ablikim, M. N. Achasov, P. Adlarson, S. Ahmed, M. Albrecht, R. Aliberti, A. Amoroso, M. R. An, Q. An, X. H. Bai, Y. Bai, O. Bakina, R. Baldini Ferroli, I. Balossino, Y. Ban, K. Begzsuren, N. Berger, M. Bertani, D. Bettoni, F. Bianchi, J. Bloms, A. Bortone, I. Boyko, R. A. Briere , et al. (495 additional authors not shown)

    Abstract: Using $(27.12\pm 0.14)\times10^8$ $ψ(3686)$ decays and data samples of $e^+e^-$ collisions with $\sqrt{s}$ from 4.130 to 4.780~GeV collected with the BESIII detector, we report the first observation of the electromagnetic Dalitz transition $h_c\to e^+e^-η_c$ with a statistical significance of $5.4σ$. We measure the ratio of the branching fractions… ▽ More

    Submitted 2 July, 2024; v1 submitted 28 June, 2024; originally announced July 2024.

  47. arXiv:2407.00029  [pdf, other

    cs.DC

    Distributed Inference Performance Optimization for LLMs on CPUs

    Authors: Pujiang He, Shan Zhou, Changqing Li, Wenhuan Huang, Weifei Yu, Duyi Wang, Chen Meng, Sheng Gui

    Abstract: Large language models (LLMs) hold tremendous potential for addressing numerous real-world challenges, yet they typically demand significant computational resources and memory. Deploying LLMs onto a resource-limited hardware device with restricted memory capacity presents considerable challenges. Distributed computing emerges as a prevalent strategy to mitigate single-node memory constraints and ex… ▽ More

    Submitted 16 May, 2024; originally announced July 2024.

    Comments: 4 pages, 3 figures, Practical ML for Low Resource Settings Workshop @ ICLR 2024

  48. arXiv:2406.19774  [pdf, other

    cs.CL

    Direct Preference Knowledge Distillation for Large Language Models

    Authors: Yixing Li, Yuxian Gu, Li Dong, Dequan Wang, Yu Cheng, Furu Wei

    Abstract: In the field of large language models (LLMs), Knowledge Distillation (KD) is a critical technique for transferring capabilities from teacher models to student models. However, existing KD methods face limitations and challenges in distillation of LLMs, including efficiency and insufficient measurement capabilities of traditional KL divergence. It is shown that LLMs can serve as an implicit reward… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

  49. arXiv:2406.19596  [pdf, other

    cs.CR cs.AI cs.LG

    Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning

    Authors: Diksha Goel, Kristen Moore, Mingyu Guo, Derui Wang, Minjune Kim, Seyit Camtepe

    Abstract: This paper addresses a significant gap in Autonomous Cyber Operations (ACO) literature: the absence of effective edge-blocking ACO strategies in dynamic, real-world networks. It specifically targets the cybersecurity vulnerabilities of organizational Active Directory (AD) systems. Unlike the existing literature on edge-blocking defenses which considers AD systems as static entities, our study coun… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: The manuscript has been accepted as full paper at European Symposium on Research in Computer Security (ESORICS) 2024

  50. Joint Beamforming and Antenna Position Optimization for Movable Antenna-Assisted Spectrum Sharing

    Authors: Xin Wei, Weidong Mei, Dong Wang, Boyu Ning, Zhi Chen

    Abstract: Fluid antennas (FAs) and movable antennas (MAs) have drawn increasing attention in wireless communications recently due to their ability to create favorable channel conditions via local antenna movement within a confined region. In this letter, we advance their application for cognitive radio to facilitate efficient spectrum sharing between primary and secondary communication systems. In particula… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.