-
Cycle Contrastive Adversarial Learning for Unsupervised image Deraining
Authors:
Chen Zhao,
Weiling Cai,
ChengWei Hu,
Zheng Yuan
Abstract:
To tackle the difficulties in fitting paired real-world data for single image deraining (SID), recent unsupervised methods have achieved notable success. However, these methods often struggle to generate high-quality, rain-free images due to a lack of attention to semantic representation and image content, resulting in ineffective separation of content from the rain layer. In this paper, we propos…
▽ More
To tackle the difficulties in fitting paired real-world data for single image deraining (SID), recent unsupervised methods have achieved notable success. However, these methods often struggle to generate high-quality, rain-free images due to a lack of attention to semantic representation and image content, resulting in ineffective separation of content from the rain layer. In this paper, we propose a novel cycle contrastive generative adversarial network for unsupervised SID, called CCLGAN. This framework combines cycle contrastive learning (CCL) and location contrastive learning (LCL). CCL improves image reconstruction and rain-layer removal by bringing similar features closer and pushing dissimilar features apart in both semantic and discriminative spaces. At the same time, LCL preserves content information by constraining mutual information at the same location across different exemplars. CCLGAN shows superior performance, as extensive experiments demonstrate the benefits of CCLGAN and the effectiveness of its components.
△ Less
Submitted 16 July, 2024;
originally announced July 2024.
-
Spectroastrometry and Reverberation Mapping (SARM) of Active Galactic Nuclei. I. The H$β$ Broad-line Region Structure and Black Hole Mass of Five Quasars
Authors:
Yan-Rong Li,
Chen Hu,
Zhu-Heng Yao,
Yong-Jie Chen,
Hua-Rui Bai,
Sen Yang,
Pu Du,
Feng-Na Fang,
Yi-Xin Fu,
Jun-Rong Liu,
Yue-Chang Peng,
Yu-Yang Songsheng,
Yi-Lin Wang,
Ming Xiao,
Shuo Zhai,
Hartmut Winkler,
Jin-Ming Bai,
Luis C. Ho,
Romain G. Petrov,
Jesus Aceituno,
Jian-Min Wang
Abstract:
We conduct a reverberation mapping (RM) campaign to spectroscopically monitor a sample of selected bright active galactic nuclei with large anticipated broad-line region (BLR) sizes adequate for spectroastrometric observations by the GRAVITY instrument on the Very Large Telescope Interferometer. We report the first results for five objects, IC 4329A, Mrk 335, Mrk 509, Mrk 1239, and PDS 456, among…
▽ More
We conduct a reverberation mapping (RM) campaign to spectroscopically monitor a sample of selected bright active galactic nuclei with large anticipated broad-line region (BLR) sizes adequate for spectroastrometric observations by the GRAVITY instrument on the Very Large Telescope Interferometer. We report the first results for five objects, IC 4329A, Mrk 335, Mrk 509, Mrk 1239, and PDS 456, among which Mrk 1239 and PDS 456 are for the first time spectroscopically monitored. We obtain multi-year monitoring data and perform multi-component spectral decomposition to extract the broad H$β$ profiles. We detect significant time lags between the H$β$ and continuum variations, generally obeying the previously established BLR size-luminosity relation. Velocity-resolved H$β$ time lags illustrate diverse, possibly evolving BLR kinematics. We further measure the H$β$ line widths from mean and rms spectra and the resulting virial products show good consistency among different seasons. Adopting a unity virial factor and the full width at half maximum of the broad H$β$ line from the mean spectrum as the measure of velocity, the obtained black hole mass averaged over seasons is $\log M_\bullet/M_\odot=8.02_{-0.14}^{+0.09}$, $6.92_{-0.12}^{+0.12}$, $8.01_{-0.25}^{+0.16}$, $7.44_{-0.14}^{+0.13}$, and $8.59_{-0.11}^{+0.07}$ for the five objects, respectively. The black hole mass estimations using other line width measures are also reported (up to the virial factors). For objects with previous RM campaigns, our mass estimates are in agreement with earlier results. In a companion paper, we will employ BLR dynamical modeling to directly infer the black hole mass and thereby determine the virial factors.
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
Multimodal Chain-of-Thought Reasoning via ChatGPT to Protect Children from Age-Inappropriate Apps
Authors:
Chuanbo Hu,
Bin Liu,
Minglei Yin,
Yilu Zhou,
Xin Li
Abstract:
Mobile applications (Apps) could expose children to inappropriate themes such as sexual content, violence, and drug use. Maturity rating offers a quick and effective method for potential users, particularly guardians, to assess the maturity levels of apps. Determining accurate maturity ratings for mobile apps is essential to protect children's health in today's saturated digital marketplace. Exist…
▽ More
Mobile applications (Apps) could expose children to inappropriate themes such as sexual content, violence, and drug use. Maturity rating offers a quick and effective method for potential users, particularly guardians, to assess the maturity levels of apps. Determining accurate maturity ratings for mobile apps is essential to protect children's health in today's saturated digital marketplace. Existing approaches to maturity rating are either inaccurate (e.g., self-reported rating by developers) or costly (e.g., manual examination). In the literature, there are few text-mining-based approaches to maturity rating. However, each app typically involves multiple modalities, namely app description in the text, and screenshots in the image. In this paper, we present a framework for determining app maturity levels that utilize multimodal large language models (MLLMs), specifically ChatGPT-4 Vision. Powered by Chain-of-Thought (CoT) reasoning, our framework systematically leverages ChatGPT-4 to process multimodal app data (i.e., textual descriptions and screenshots) and guide the MLLM model through a step-by-step reasoning pathway from initial content analysis to final maturity rating determination. As a result, through explicitly incorporating CoT reasoning, our framework enables ChatGPT to understand better and apply maturity policies to facilitate maturity rating. Experimental results indicate that the proposed method outperforms all baseline models and other fusion strategies.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Toward Precise Robotic Weed Flaming Using a Mobile Manipulator with a Flamethrower
Authors:
Di Wang,
Chengsong Hu,
Shuangyu Xie,
Joe Johnson,
Hojun Ji,
Yingtao Jiang,
Muthukumar Bagavathiannan,
Dezhen Song
Abstract:
Robotic weed flaming is a new and environmentally friendly approach to weed removal in the agricultural field. Using a mobile manipulator equipped with a flamethrower, we design a new system and algorithm to enable effective weed flaming, which requires robotic manipulation with a soft and deformable end effector, as the thermal coverage of the flame is affected by dynamic or unknown environmental…
▽ More
Robotic weed flaming is a new and environmentally friendly approach to weed removal in the agricultural field. Using a mobile manipulator equipped with a flamethrower, we design a new system and algorithm to enable effective weed flaming, which requires robotic manipulation with a soft and deformable end effector, as the thermal coverage of the flame is affected by dynamic or unknown environmental factors such as gravity, wind, atmospheric pressure, fuel tank pressure, and pose of the nozzle. System development includes overall design, hardware integration, and software pipeline. To enable precise weed removal, the greatest challenge is to detect and predict dynamic flame coverage in real time before motion planning, which is quite different from a conventional rigid gripper in grasping or a spray gun in painting. Based on the images from two onboard infrared cameras and the pose information of the flamethrower nozzle on a mobile manipulator, we propose a new dynamic flame coverage model. The flame model uses a center-arc curve with a Gaussian cross-section model to describe the flame coverage in real time. The experiments have demonstrated the working system and shown that our model and algorithm can achieve a mean average precision (mAP) of more than 76\% in the reprojected images during online prediction.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Multi-View Black-Box Physical Attacks on Infrared Pedestrian Detectors Using Adversarial Infrared Grid
Authors:
Kalibinuer Tiliwalidi,
Chengyin Hu,
Weiwen Shi
Abstract:
While extensive research exists on physical adversarial attacks within the visible spectrum, studies on such techniques in the infrared spectrum are limited. Infrared object detectors are vital in modern technological applications but are susceptible to adversarial attacks, posing significant security threats. Previous studies using physical perturbations like light bulb arrays and aerogels for wh…
▽ More
While extensive research exists on physical adversarial attacks within the visible spectrum, studies on such techniques in the infrared spectrum are limited. Infrared object detectors are vital in modern technological applications but are susceptible to adversarial attacks, posing significant security threats. Previous studies using physical perturbations like light bulb arrays and aerogels for white-box attacks, or hot and cold patches for black-box attacks, have proven impractical or limited in multi-view support. To address these issues, we propose the Adversarial Infrared Grid (AdvGrid), which models perturbations in a grid format and uses a genetic algorithm for black-box optimization. These perturbations are cyclically applied to various parts of a pedestrian's clothing to facilitate multi-view black-box physical attacks on infrared pedestrian detectors. Extensive experiments validate AdvGrid's effectiveness, stealthiness, and robustness. The method achieves attack success rates of 80.00\% in digital environments and 91.86\% in physical environments, outperforming baseline methods. Additionally, the average attack success rate exceeds 50\% against mainstream detectors, demonstrating AdvGrid's robustness. Our analyses include ablation studies, transfer attacks, and adversarial defenses, confirming the method's superiority.
△ Less
Submitted 8 July, 2024; v1 submitted 1 July, 2024;
originally announced July 2024.
-
On the boundedness of degenerate hypergraphs
Authors:
Jianfeng Hou,
Caiyun Hu,
Heng Li,
Xizhi Liu,
Caihong Yang,
Yixiao Zhang
Abstract:
We investigate the impact of a high-degree vertex in Turán problems for degenerate hypergraphs (including graphs). We say an $r$-graph $F$ is bounded if there exist constants $α, β>0$ such that for large $n$, every $n$-vertex $F$-free $r$-graph with a vertex of degree at least $α\binom{n-1}{r-1}$ has fewer than $(1-β) \cdot \mathrm{ex}(n,F)$ edges. The boundedness property is crucial for recent wo…
▽ More
We investigate the impact of a high-degree vertex in Turán problems for degenerate hypergraphs (including graphs). We say an $r$-graph $F$ is bounded if there exist constants $α, β>0$ such that for large $n$, every $n$-vertex $F$-free $r$-graph with a vertex of degree at least $α\binom{n-1}{r-1}$ has fewer than $(1-β) \cdot \mathrm{ex}(n,F)$ edges. The boundedness property is crucial for recent works~\cite{HHLLYZ23a,DHLY24} that aim to extend the classical Hajnal--Szemerédi Theorem and the anti-Ramsey theorems of Erdős--Simonovits--Sós.
We show that many well-studied degenerate hypergraphs, such as all even cycles, most complete bipartite graphs, and the expansion of most complete bipartite graphs, are bounded. In addition, to prove the boundedness of the expansion of complete bipartite graphs, we introduce and solve a Zarankiewicz-type problem for $3$-graphs, strengthening a theorem by Kostochka--Mubayi--Verstraëte~\cite{KMV15}.
△ Less
Submitted 29 June, 2024;
originally announced July 2024.
-
Exploring Energy-Based Models for Out-of-Distribution Detection in Dialect Identification
Authors:
Yaqian Hao,
Chenguang Hu,
Yingying Gao,
Shilei Zhang,
Junlan Feng
Abstract:
The diverse nature of dialects presents challenges for models trained on specific linguistic patterns, rendering them susceptible to errors when confronted with unseen or out-of-distribution (OOD) data. This study introduces a novel margin-enhanced joint energy model (MEJEM) tailored specifically for OOD detection in dialects. By integrating a generative model and the energy margin loss, our appro…
▽ More
The diverse nature of dialects presents challenges for models trained on specific linguistic patterns, rendering them susceptible to errors when confronted with unseen or out-of-distribution (OOD) data. This study introduces a novel margin-enhanced joint energy model (MEJEM) tailored specifically for OOD detection in dialects. By integrating a generative model and the energy margin loss, our approach aims to enhance the robustness of dialect identification systems. Furthermore, we explore two OOD scores for OOD dialect detection, and our findings conclusively demonstrate that the energy score outperforms the softmax score. Leveraging Sharpness-Aware Minimization to optimize the training process of the joint model, we enhance model generalization by minimizing both loss and sharpness. Experiments conducted on dialect identification tasks validate the efficacy of Energy-Based Models and provide valuable insights into their performance.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
On Calibration of Speech Classification Models: Insights from Energy-Based Model Investigations
Authors:
Yaqian Hao,
Chenguang Hu,
Yingying Gao,
Shilei Zhang,
Junlan Feng
Abstract:
For speech classification tasks, deep learning models often achieve high accuracy but exhibit shortcomings in calibration, manifesting as classifiers exhibiting overconfidence. The significance of calibration lies in its critical role in guaranteeing the reliability of decision-making within deep learning systems. This study explores the effectiveness of Energy-Based Models in calibrating confiden…
▽ More
For speech classification tasks, deep learning models often achieve high accuracy but exhibit shortcomings in calibration, manifesting as classifiers exhibiting overconfidence. The significance of calibration lies in its critical role in guaranteeing the reliability of decision-making within deep learning systems. This study explores the effectiveness of Energy-Based Models in calibrating confidence for speech classification tasks by training a joint EBM integrating a discriminative and a generative model, thereby enhancing the classifiers calibration and mitigating overconfidence. Experimental evaluations conducted on three speech classification tasks specifically: age, emotion, and language recognition. Our findings highlight the competitive performance of EBMs in calibrating the speech classification models. This research emphasizes the potential of EBMs in speech classification tasks, demonstrating their ability to enhance calibration without sacrificing accuracy.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Deep Mamba Multi-modal Learning
Authors:
Jian Zhu,
Xin Zou,
Yu Cui,
Zhangmin Huang,
Chenshu Hu,
Bo Lyu
Abstract:
Inspired by the excellent performance of Mamba networks, we propose a novel Deep Mamba Multi-modal Learning (DMML). It can be used to achieve the fusion of multi-modal features. We apply DMML to the field of multimedia retrieval and propose an innovative Deep Mamba Multi-modal Hashing (DMMH) method. It combines the advantages of algorithm accuracy and inference speed. We validated the effectivenes…
▽ More
Inspired by the excellent performance of Mamba networks, we propose a novel Deep Mamba Multi-modal Learning (DMML). It can be used to achieve the fusion of multi-modal features. We apply DMML to the field of multimedia retrieval and propose an innovative Deep Mamba Multi-modal Hashing (DMMH) method. It combines the advantages of algorithm accuracy and inference speed. We validated the effectiveness of DMMH on three public datasets and achieved state-of-the-art results.
△ Less
Submitted 9 April, 2024;
originally announced June 2024.
-
MemServe: Context Caching for Disaggregated LLM Serving with Elastic Memory Pool
Authors:
Cunchen Hu,
Heyang Huang,
Junhao Hu,
Jiang Xu,
Xusheng Chen,
Tao Xie,
Chenxi Wang,
Sa Wang,
Yungang Bao,
Ninghui Sun,
Yizhou Shan
Abstract:
Large language model (LLM) serving has transformed from stateless to stateful systems, utilizing techniques like context caching and disaggregated inference. These optimizations extend the lifespan and domain of the KV cache, necessitating a new architectural approach. We present MemServe, a unified system that integrates both inter-request and intra-request optimizations. MemServe introduces MemP…
▽ More
Large language model (LLM) serving has transformed from stateless to stateful systems, utilizing techniques like context caching and disaggregated inference. These optimizations extend the lifespan and domain of the KV cache, necessitating a new architectural approach. We present MemServe, a unified system that integrates both inter-request and intra-request optimizations. MemServe introduces MemPool, an elastic memory pool managing distributed memory and KV caches across serving instances. Using MemPool APIs, MemServe combines context caching with disaggregated inference for the first time, supported by a global scheduler that enhances cache reuse through a global prompt tree-based locality-aware policy. Tests show that MemServe significantly improves job completion time and time-to-first-time.
△ Less
Submitted 26 June, 2024; v1 submitted 25 June, 2024;
originally announced June 2024.
-
Facial Identity Anonymization via Intrinsic and Extrinsic Attention Distraction
Authors:
Zhenzhong Kuang,
Xiaochen Yang,
Yingjie Shen,
Chao Hu,
Jun Yu
Abstract:
The unprecedented capture and application of face images raise increasing concerns on anonymization to fight against privacy disclosure. Most existing methods may suffer from the problem of excessive change of the identity-independent information or insufficient identity protection. In this paper, we present a new face anonymization approach by distracting the intrinsic and extrinsic identity atte…
▽ More
The unprecedented capture and application of face images raise increasing concerns on anonymization to fight against privacy disclosure. Most existing methods may suffer from the problem of excessive change of the identity-independent information or insufficient identity protection. In this paper, we present a new face anonymization approach by distracting the intrinsic and extrinsic identity attentions. On the one hand, we anonymize the identity information in the feature space by distracting the intrinsic identity attention. On the other, we anonymize the visual clues (i.e. appearance and geometry structure) by distracting the extrinsic identity attention. Our approach allows for flexible and intuitive manipulation of face appearance and geometry structure to produce diverse results, and it can also be used to instruct users to perform personalized anonymization. We conduct extensive experiments on multiple datasets and demonstrate that our approach outperforms state-of-the-art methods.
△ Less
Submitted 6 July, 2024; v1 submitted 24 June, 2024;
originally announced June 2024.
-
AGN STORM 2: IX. Studying the Dynamics of the Ionized Obscurer in Mrk 817 with High-resolution X-ray Spectroscopy
Authors:
Fatima Zaidouni,
Erin Kara,
Peter Kosec,
Missagh Mehdipour,
Daniele Rogantini,
Gerard A. Kriss,
Ehud Behar,
Jelle Kaastra,
Aaron J. Barth,
Edward M. Cackett,
Gisella De Rosa,
Yasaman Homayouni,
Keith Horne,
Hermine Landt,
Nahum Arav,
Misty C. Bentz,
Michael S. Brotherton,
Elena Dalla Bontà,
Maryam Dehghanian,
Gary J. Ferland,
Carina Fian,
Jonathan Gelbord,
Michael R. Goad,
Diego H. González Buitrago,
Catherine J. Grier
, et al. (23 additional authors not shown)
Abstract:
We present the results of the XMM-Newton and NuSTAR observations taken as part of the ongoing, intensive multi-wavelength monitoring program of the Seyfert 1 galaxy Mrk 817 by the AGN Space Telescope and Optical Reverberation Mapping 2 (AGN STORM 2) Project. The campaign revealed an unexpected and transient obscuring outflow, never before seen in this source. Of our four XMM-Newton/NuSTAR epochs,…
▽ More
We present the results of the XMM-Newton and NuSTAR observations taken as part of the ongoing, intensive multi-wavelength monitoring program of the Seyfert 1 galaxy Mrk 817 by the AGN Space Telescope and Optical Reverberation Mapping 2 (AGN STORM 2) Project. The campaign revealed an unexpected and transient obscuring outflow, never before seen in this source. Of our four XMM-Newton/NuSTAR epochs, one fortuitously taken during a bright X-ray state has strong narrow absorption lines in the high-resolution grating spectra. From these absorption features, we determine that the obscurer is in fact a multi-phase ionized wind with an outflow velocity of $\sim$5200 km s$^{-1}$, and for the first time find evidence for a lower ionization component with the same velocity observed in absorption features in the contemporaneous HST spectra. This indicates that the UV absorption troughs may be due to dense clumps embedded in diffuse, higher ionization gas responsible for the X-ray absorption lines of the same velocity. We observe variability in the shape of the absorption lines on timescales of hours, placing the variable component at roughly 1000 $R_g$ if attributed to transverse motion along the line of sight. This estimate aligns with independent UV measurements of the distance to the obscurer suggesting an accretion disk wind at the inner broad line region. We estimate that it takes roughly 200 days for the outflow to travel from the disk to our line of sight, consistent with the timescale of the outflow's column density variations throughout the campaign.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
An antiferromagnetic diode effect in even-layered MnBi2Te4
Authors:
Anyuan Gao,
Shao-Wen Chen,
Barun Ghosh,
Jian-Xiang Qiu,
Yu-Fei Liu,
Yugo Onishi,
Chaowei Hu,
Tiema Qian,
Damien Bérubé,
Thao Dinh,
Houchen Li,
Christian Tzschaschel,
Seunghyun Park,
Tianye Huang,
Shang-Wei Lien,
Zhe Sun,
Sheng-Chin Ho,
Bahadur Singh,
Kenji Watanabe,
Takashi Taniguchi,
David C. Bell,
Arun Bansil,
Hsin Lin,
Tay-Rong Chang,
Amir Yacoby
, et al. (4 additional authors not shown)
Abstract:
In a PN junction, the separation between positive and negative charges leads to diode transport. In the past few years, the intrinsic diode transport in noncentrosymmetric polar conductors has attracted great interest, because it suggests novel nonlinear applications and provides a symmetry-sensitive probe of Fermi surface. Recently, such studies have been extended to noncentrosymmetric supercondu…
▽ More
In a PN junction, the separation between positive and negative charges leads to diode transport. In the past few years, the intrinsic diode transport in noncentrosymmetric polar conductors has attracted great interest, because it suggests novel nonlinear applications and provides a symmetry-sensitive probe of Fermi surface. Recently, such studies have been extended to noncentrosymmetric superconductors, realizing the superconducting diode effect. Here, we show that, even in a centrosymmetric crystal without directional charge separation, the spins of an antiferromagnet (AFM) can generate a spatial directionality, leading to an AFM diode effect. We observe large second-harmonic transport in a nonlinear electronic device enabled by the compensated AFM state of even-layered MnBi2Te4. We also report a novel electrical sum-frequency generation (SFG), which has been rarely explored in contrast to the well-known optical SFG in wide-gap insulators. We demonstrate that the AFM enables an in-plane field-effect transistor and harvesting of wireless electromagnetic energy. The electrical SFG establishes a powerful method to study nonlinear electronics built by quantum materials. The AFM diode effect paves the way for potential device concepts including AFM logic circuits, self-powered AFM spintronics, and other applications that potentially bridge nonlinear electronics with AFM spintronics.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Improving Zero-Shot Cross-Lingual Transfer via Progressive Code-Switching
Authors:
Zhuoran Li,
Chunming Hu,
Junfan Chen,
Zhijun Chen,
Xiaohui Guo,
Richong Zhang
Abstract:
Code-switching is a data augmentation scheme mixing words from multiple languages into source lingual text. It has achieved considerable generalization performance of cross-lingual transfer tasks by aligning cross-lingual contextual word representations. However, uncontrolled and over-replaced code-switching would augment dirty samples to model training. In other words, the excessive code-switchin…
▽ More
Code-switching is a data augmentation scheme mixing words from multiple languages into source lingual text. It has achieved considerable generalization performance of cross-lingual transfer tasks by aligning cross-lingual contextual word representations. However, uncontrolled and over-replaced code-switching would augment dirty samples to model training. In other words, the excessive code-switching text samples will negatively hurt the models' cross-lingual transferability. To this end, we propose a Progressive Code-Switching (PCS) method to gradually generate moderately difficult code-switching examples for the model to discriminate from easy to hard. The idea is to incorporate progressively the preceding learned multilingual knowledge using easier code-switching data to guide model optimization on succeeding harder code-switching data. Specifically, we first design a difficulty measurer to measure the impact of replacing each word in a sentence based on the word relevance score. Then a code-switcher generates the code-switching data of increasing difficulty via a controllable temperature variable. In addition, a training scheduler decides when to sample harder code-switching data for model training. Experiments show our model achieves state-of-the-art results on three different zero-shot cross-lingual transfer tasks across ten languages.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
CEC: A Noisy Label Detection Method for Speaker Recognition
Authors:
Yao Shen,
Yingying Gao,
Yaqian Hao,
Chenguang Hu,
Fulin Zhang,
Junlan Feng,
Shilei Zhang
Abstract:
Noisy labels are inevitable, even in well-annotated datasets. The detection of noisy labels is of significant importance to enhance the robustness of speaker recognition models. In this paper, we propose a novel noisy label detection approach based on two new statistical metrics: Continuous Inconsistent Counting (CIC) and Total Inconsistent Counting (TIC). These metrics are calculated through Cros…
▽ More
Noisy labels are inevitable, even in well-annotated datasets. The detection of noisy labels is of significant importance to enhance the robustness of speaker recognition models. In this paper, we propose a novel noisy label detection approach based on two new statistical metrics: Continuous Inconsistent Counting (CIC) and Total Inconsistent Counting (TIC). These metrics are calculated through Cross-Epoch Counting (CEC) and correspond to the early and late stages of training, respectively. Additionally, we categorize samples based on their prediction results into three categories: inconsistent samples, hard samples, and easy samples. During training, we gradually increase the difficulty of hard samples to update model parameters, preventing noisy labels from being overfitted. Compared to contrastive schemes, our approach not only achieves the best performance in speaker verification but also excels in noisy label detection.
△ Less
Submitted 19 June, 2024;
originally announced June 2024.
-
Noise-induced quantum synchronization and maximally entangled mixed states in superconducting circuits
Authors:
Ziyu Tao,
Finn Schmolke,
Chang-Kang Hu,
Wenhui Huang,
Yuxuan Zhou,
Jiawei Zhang,
Ji Chu,
Libo Zhang,
Xuandong Sun,
Zecheng Guo,
Jingjing Niu,
Wenle Weng,
Song Liu,
Youpeng Zhong,
Dian Tan,
Dapeng Yu,
Eric Lutz
Abstract:
Random fluctuations can lead to cooperative effects in complex systems. We here report the experimental observation of noise-induced quantum synchronization in a chain of superconducting transmon qubits with nearest-neighbor interactions. The application of Gaussian white noise to a single site leads to synchronous oscillations in the entire chain. We show that the two synchronized end qubits are…
▽ More
Random fluctuations can lead to cooperative effects in complex systems. We here report the experimental observation of noise-induced quantum synchronization in a chain of superconducting transmon qubits with nearest-neighbor interactions. The application of Gaussian white noise to a single site leads to synchronous oscillations in the entire chain. We show that the two synchronized end qubits are entangled, with nonzero concurrence, and that they belong to a class of generalized Bell states known as maximally entangled mixed states, whose entanglement cannot be increased by any global unitary. We further demonstrate the stability against frequency detuning of both synchronization and entanglement by determining the corresponding generalized Arnold tongue diagrams. Our results highlight the constructive influence of noise in a quantum many-body system and uncover the potential role of synchronization for mixed-state quantum information science.
△ Less
Submitted 14 June, 2024;
originally announced June 2024.
-
Ferromagnetism and Topology of the Higher Flat Band in a Fractional Chern Insulator
Authors:
Heonjoon Park,
Jiaqi Cai,
Eric Anderson,
Xiao-Wei Zhang,
Xiaoyu Liu,
William Holtzmann,
Weijie Li,
Chong Wang,
Chaowei Hu,
Yuzhou Zhao,
Takashi Taniguchi,
Kenji Watanabe,
Jihui Yang,
David Cobden,
Jiun-Haw Chu,
Nicolas Regnault,
B. Andrei Bernevig,
Liang Fu,
Ting Cao,
Di Xiao,
Xiaodong Xu
Abstract:
The recent observation of the fractional quantum anomalous Hall effect in moiré fractional Chern insulators (FCI) provides opportunities for investigating zero magnetic field anyons. So far, both experimental and theoretical results suggest that filling > 1/3 FCI states in the first Chern band share features with those of the lowest Landau level (LL). To create the possibility of realizing non-Abe…
▽ More
The recent observation of the fractional quantum anomalous Hall effect in moiré fractional Chern insulators (FCI) provides opportunities for investigating zero magnetic field anyons. So far, both experimental and theoretical results suggest that filling > 1/3 FCI states in the first Chern band share features with those of the lowest Landau level (LL). To create the possibility of realizing non-Abelian anyons, one route is to engineer higher flat Chern bands that mimic higher LLs. Here, we investigate the interaction, topology, and ferromagnetism of the second moiré miniband in twisted MoTe2 bilayer (tMoTe2). Around filling factor v = -3, i.e., half-filling of the second miniband, we uncover spontaneous ferromagnetism and an incipient Chern insulator state. By measuring the anomalous Hall effect as a function of twist angle, we find that the Chern numbers (C) of the top two moiré flat bands have opposite sign (C = -+1) at twist angles above 3.1° but the same sign (C = -1) around 2.6°. This observation is consistent with the recently predicted twist-angle dependent band topology, resulting from the competition between moiré ferroelectricity and piezoelectricity. As we increase the magnetic field, only the small twist-angle device (2.6°) experiences a topological phase transition with an emergent C = -2 state. This is attributed to a Zeeman field-induced band crossing between opposite valleys, with the determined C = -1 for the top two bands. Our results lay a firm foundation for understanding the higher flat Chern bands, which is essential for the prediction or discovery of non-Abelian FCIs.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
3D Building Generation in Minecraft via Large Language Models
Authors:
Shiying Hu,
Zengrong Huang,
Chengpeng Hu,
Jialin Liu
Abstract:
Recently, procedural content generation has exhibited considerable advancements in the domain of 2D game level generation such as Super Mario Bros. and Sokoban through large language models (LLMs). To further validate the capabilities of LLMs, this paper explores how LLMs contribute to the generation of 3D buildings in a sandbox game, Minecraft. We propose a Text to Building in Minecraft (T2BM) mo…
▽ More
Recently, procedural content generation has exhibited considerable advancements in the domain of 2D game level generation such as Super Mario Bros. and Sokoban through large language models (LLMs). To further validate the capabilities of LLMs, this paper explores how LLMs contribute to the generation of 3D buildings in a sandbox game, Minecraft. We propose a Text to Building in Minecraft (T2BM) model, which involves refining prompts, decoding interlayer representation and repairing. Facade, indoor scene and functional blocks like doors are supported in the generation. Experiments are conducted to evaluate the completeness and satisfaction of buildings generated via LLMs. It shows that LLMs hold significant potential for 3D building generation. Given appropriate prompts, LLMs can generate correct buildings in Minecraft with complete structures and incorporate specific building blocks such as windows and beds, meeting the specified requirements of human users.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Constraints on Ultra Heavy Dark Matter Properties from Dwarf Spheroidal Galaxies with LHAASO Observations
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
In this work we try to search for signals generated by ultra-heavy dark matter at the Large High Altitude Air Shower Observatory (LHAASO) data. We look for possible gamma-ray by dark matter annihilation or decay from 16 dwarf spheroidal galaxies in the field of view of LHAASO. Dwarf spheroidal galaxies are among the most promising targets for indirect detection of dark matter which have low fluxes…
▽ More
In this work we try to search for signals generated by ultra-heavy dark matter at the Large High Altitude Air Shower Observatory (LHAASO) data. We look for possible gamma-ray by dark matter annihilation or decay from 16 dwarf spheroidal galaxies in the field of view of LHAASO. Dwarf spheroidal galaxies are among the most promising targets for indirect detection of dark matter which have low fluxes of astrophysical $γ$-ray background while large amount of dark matter. By analyzing more than 700 days observational data at LHAASO, no significant dark matter signal from 1 TeV to 1 EeV is detected. Accordingly we derive the most stringent constraints on the ultra-heavy dark matter annihilation cross-section up to EeV. The constraints on the lifetime of dark matter in decay mode are also derived.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
A Software Engineering Perspective on Testing Large Language Models: Research, Practice, Tools and Benchmarks
Authors:
Sinclair Hudson,
Sophia Jit,
Boyue Caroline Hu,
Marsha Chechik
Abstract:
Large Language Models (LLMs) are rapidly becoming ubiquitous both as stand-alone tools and as components of current and future software systems. To enable usage of LLMs in the high-stake or safety-critical systems of 2030, they need to undergo rigorous testing. Software Engineering (SE) research on testing Machine Learning (ML) components and ML-based systems has systematically explored many topic…
▽ More
Large Language Models (LLMs) are rapidly becoming ubiquitous both as stand-alone tools and as components of current and future software systems. To enable usage of LLMs in the high-stake or safety-critical systems of 2030, they need to undergo rigorous testing. Software Engineering (SE) research on testing Machine Learning (ML) components and ML-based systems has systematically explored many topics such as test input generation and robustness. We believe knowledge about tools, benchmarks, research and practitioner views related to LLM testing needs to be similarly organized. To this end, we present a taxonomy of LLM testing topics and conduct preliminary studies of state of the art and practice approaches to research, open-source tools and benchmarks for LLM testing, mapping results onto this taxonomy. Our goal is to identify gaps requiring more research and engineering effort and inspire a clearer communication between LLM practitioners and the SE research community.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Teaching Language Models to Self-Improve by Learning from Language Feedback
Authors:
Chi Hu,
Yimin Hu,
Hang Cao,
Tong Xiao,
Jingbo Zhu
Abstract:
Aligning Large Language Models (LLMs) with human intentions and values is crucial yet challenging. Current methods primarily rely on human preferences, which are costly and insufficient in capturing nuanced feedback expressed in natural language. In this paper, we present Self-Refinement Tuning (SRT), a method that leverages model feedback for alignment, thereby reducing reliance on human annotati…
▽ More
Aligning Large Language Models (LLMs) with human intentions and values is crucial yet challenging. Current methods primarily rely on human preferences, which are costly and insufficient in capturing nuanced feedback expressed in natural language. In this paper, we present Self-Refinement Tuning (SRT), a method that leverages model feedback for alignment, thereby reducing reliance on human annotations. SRT uses a base language model (e.g., Tulu2) to generate initial responses, which are critiqued and refined by a more advanced model (e.g., GPT-4-Turbo). This process enables the base model to self-evaluate and improve its outputs, facilitating continuous learning. SRT further optimizes the model by learning from its self-generated feedback and refinements, creating a feedback loop that promotes model improvement. Our empirical evaluations demonstrate that SRT significantly outperforms strong baselines across diverse tasks and model sizes. When applied to a 70B parameter model, SRT increases the win rate from 9.6\% to 25.8\% on the AlpacaEval 2.0 benchmark, surpassing well-established systems such as GPT-4-0314, Claude 2, and Gemini. Our analysis highlights the crucial role of language feedback in the success of SRT, suggesting potential for further exploration in this direction.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
MatrixGate: A High-performance Data Ingestion Tool for Time-series Databases
Authors:
Shuhui Wang,
Zihan Sun,
Chaochen Hu,
Chao Li,
Yong Zhang,
Yandong Yao,
Hao Wang,
Chunxiao Xing
Abstract:
Recent years have seen massive time-series data generated in many areas. This different scenario brings new challenges, particularly in terms of data ingestion, where existing technologies struggle to handle such massive time-series data, leading to low loading speed and poor timeliness. To address these challenges, this paper presents MatrixGate, a new and efficient data ingestion approach for ma…
▽ More
Recent years have seen massive time-series data generated in many areas. This different scenario brings new challenges, particularly in terms of data ingestion, where existing technologies struggle to handle such massive time-series data, leading to low loading speed and poor timeliness. To address these challenges, this paper presents MatrixGate, a new and efficient data ingestion approach for massive time-series data. MatrixGate implements both single-instance and multi-instance parallel procedures, which is based on its unique ingestion strategies. First, MatrixGate uses policies to tune the slots that are synchronized with segments to ingest data, which eliminates the cost of starting transactions and enhance the efficiency. Second, multi-coroutines are responsible for transfer data, which can increase the degree of parallelism significantly. Third, lock-free queues are used to enable direct data transfer without the need for disk storage or lodging in the master instance. Experiment results on multiple datasets show that MatrixGate outperforms state-of-the-art methods by 3 to 100 times in loading speed, and cuts down about 80% query latency. Furthermore, MatrixGate scales out efficiently under distributed architecture, achieving scalability of 86%.
△ Less
Submitted 8 June, 2024;
originally announced June 2024.
-
Ubiquitous Flat Bands in a Cr-based Kagome Superconductor
Authors:
Yucheng Guo,
Zehao Wang,
Fang Xie,
Yuefei Huang,
Bin Gao,
Ji Seop Oh,
Han Wu,
Zhaoyu Liu,
Zheng Ren,
Yuan Fang,
Ananya Biswas,
Yichen Zhang,
Ziqin Yue,
Cheng Hu,
Chris Jozwiak,
Aaron Bostwick,
Eli Rotenberg,
Makoto Hashimoto,
Donghui Lu,
Junichiro Kono,
Jiun-Haw Chu,
Boris I Yakobson,
Robert J Birgeneau,
Qimiao Si,
Pengcheng Dai
, et al. (1 additional authors not shown)
Abstract:
In the quest for novel quantum states driven by topology and correlation, kagome lattice materials have garnered significant interest due to their distinctive electronic band structures, featuring flat bands (FBs) arising from the quantum destructive interference of the electronic wave function. The tuning of the FBs to the chemical potential would lead to the possibility of liberating electronic…
▽ More
In the quest for novel quantum states driven by topology and correlation, kagome lattice materials have garnered significant interest due to their distinctive electronic band structures, featuring flat bands (FBs) arising from the quantum destructive interference of the electronic wave function. The tuning of the FBs to the chemical potential would lead to the possibility of liberating electronic instabilities that lead to emergent electronic orders. Despite extensive studies, direct evidence of FBs tuned to the chemical potential and their participation in emergent electronic orders have been lacking in bulk quantum materials. Here using a combination of Angle-Resolved Photoemission Spectroscopy (ARPES) and Density Functional Theory (DFT), we reveal that the low-energy electronic structure of the recently discovered Cr-based kagome metal superconductor CsCr3Sb5 is dominated by a pervasive FB in close proximity to, and below the Fermi level. A comparative analysis with orbital-projected DFT and polarization dependence measurement uncovers that an orbital-selective renormalization mechanism is needed to reconcile the discrepancy with the DFT calculations, which predict the FB to appear 200 meV above the Fermi level. Furthermore, we observe the FB to shift away from the Fermi level by 20 meV in the low-temperature density wave-ordered phase, highlighting the role of the FB in the emergent electronic order. Our results reveal CsCr3Sb5 to stand out as a promising platform for further exploration into the effects of FBs near the Fermi level on kagome lattices, and their role in emergent orders in bulk quantum materials.
△ Less
Submitted 12 June, 2024; v1 submitted 7 June, 2024;
originally announced June 2024.
-
DiNeR: a Large Realistic Dataset for Evaluating Compositional Generalization
Authors:
Chengang Hu,
Xiao Liu,
Yansong Feng
Abstract:
Most of the existing compositional generalization datasets are synthetically-generated, resulting in a lack of natural language variation. While there have been recent attempts to introduce non-synthetic datasets for compositional generalization, they suffer from either limited data scale or a lack of diversity in the forms of combinations. To better investigate compositional generalization with m…
▽ More
Most of the existing compositional generalization datasets are synthetically-generated, resulting in a lack of natural language variation. While there have been recent attempts to introduce non-synthetic datasets for compositional generalization, they suffer from either limited data scale or a lack of diversity in the forms of combinations. To better investigate compositional generalization with more linguistic phenomena and compositional diversity, we propose the DIsh NamE Recognition (DiNeR) task and create a large realistic Chinese dataset. Given a recipe instruction, models are required to recognize the dish name composed of diverse combinations of food, actions, and flavors. Our dataset consists of 3,811 dishes and 228,114 recipes, and involves plenty of linguistic phenomena such as anaphora, omission and ambiguity. We provide two strong baselines based on T5 and large language models (LLMs). This work contributes a challenging task, baseline methods to tackle the task, and insights into compositional generalization in the context of dish name recognition. Code and data are available at https://github.com/Jumpy-pku/DiNeR.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
Mini Honor of Kings: A Lightweight Environment for Multi-Agent Reinforcement Learning
Authors:
Lin Liu,
Jian Zhao,
Cheng Hu,
Zhengtao Cao,
Youpeng Zhao,
Zhenbin Ye,
Meng Meng,
Wenjun Wang,
Zhaofeng He,
Houqiang Li,
Xia Lin,
Lanxiao Huang
Abstract:
Games are widely used as research environments for multi-agent reinforcement learning (MARL), but they pose three significant challenges: limited customization, high computational demands, and oversimplification. To address these issues, we introduce the first publicly available map editor for the popular mobile game Honor of Kings and design a lightweight environment, Mini Honor of Kings (Mini Ho…
▽ More
Games are widely used as research environments for multi-agent reinforcement learning (MARL), but they pose three significant challenges: limited customization, high computational demands, and oversimplification. To address these issues, we introduce the first publicly available map editor for the popular mobile game Honor of Kings and design a lightweight environment, Mini Honor of Kings (Mini HoK), for researchers to conduct experiments. Mini HoK is highly efficient, allowing experiments to be run on personal PCs or laptops while still presenting sufficient challenges for existing MARL algorithms. We have tested our environment on common MARL algorithms and demonstrated that these algorithms have yet to find optimal solutions within this environment. This facilitates the dissemination and advancement of MARL methods within the research community. Additionally, we hope that more researchers will leverage the Honor of Kings map editor to develop innovative and scientifically valuable new maps. Our code and user manual are available at: https://github.com/tencent-ailab/mini-hok.
△ Less
Submitted 16 June, 2024; v1 submitted 6 June, 2024;
originally announced June 2024.
-
Time-resolved optical assessment of exciton formation in mixed two-dimensional perovskite films
Authors:
Zheng Zhang,
Jianan Wang,
Yijie Shi,
Xi Wang,
Zhong Wang,
Xiangyu Zhu,
Chunlong Hu,
Zonghao Liu,
Wei Chen,
Wenxi Liang
Abstract:
We report the observation of exciton formation from the cooled band-edge carriers in mixed two-dimensional hybrid organic-inorganic perovskites using femtosecond transient absorption spectroscopy. By monitoring the changes of bleach signal upon excitations with various photon energy, we are able to extract the values of exciton binding energy and the occupancies of carriers of free and bound state…
▽ More
We report the observation of exciton formation from the cooled band-edge carriers in mixed two-dimensional hybrid organic-inorganic perovskites using femtosecond transient absorption spectroscopy. By monitoring the changes of bleach signal upon excitations with various photon energy, we are able to extract the values of exciton binding energy and the occupancies of carriers of free and bound states for each two-dimensional phase. We also confirm the existence of Mahan exciton when injected carrier density is above the Mott criterion.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Towards tree Yang-Mills and Yang-Mills-scalar amplitudes with higher-derivative interactions
Authors:
Kang Zhou,
Chang Hu
Abstract:
In our recent works, a new approach for constructing tree amplitudes, based on exploiting soft behaviors, was proposed. In this paper, we extend this approach to effective theories for gluons which incorporate higher-derivative interactions. By applying our method, we construct tree Yang-Mills (YM) and Yang-Mills-scalar (YMS) amplitudes with the single insertion of $F^3$ local operator, as well as…
▽ More
In our recent works, a new approach for constructing tree amplitudes, based on exploiting soft behaviors, was proposed. In this paper, we extend this approach to effective theories for gluons which incorporate higher-derivative interactions. By applying our method, we construct tree Yang-Mills (YM) and Yang-Mills-scalar (YMS) amplitudes with the single insertion of $F^3$ local operator, as well as the YM amplitudes those receive contributions from both $F^3$ and $F^4$ operators. All results are represented as universal expansions to appropriate basis. We also conjecture a compact general formula for tree YM amplitudes with higher mass dimension, which allows us to generate them from ordinary YM amplitudes, and discuss the consistent factorizations of the conjectured formula.
△ Less
Submitted 5 June, 2024;
originally announced June 2024.
-
DeNVeR: Deformable Neural Vessel Representations for Unsupervised Video Vessel Segmentation
Authors:
Chun-Hung Wu,
Shih-Hong Chen,
Chih-Yao Hu,
Hsin-Yu Wu,
Kai-Hsin Chen,
Yu-You Chen,
Chih-Hai Su,
Chih-Kuo Lee,
Yu-Lun Liu
Abstract:
This paper presents Deformable Neural Vessel Representations (DeNVeR), an unsupervised approach for vessel segmentation in X-ray videos without annotated ground truth. DeNVeR uses optical flow and layer separation, enhancing segmentation accuracy and adaptability through test-time training. A key component of our research is the introduction of the XACV dataset, the first X-ray angiography coronar…
▽ More
This paper presents Deformable Neural Vessel Representations (DeNVeR), an unsupervised approach for vessel segmentation in X-ray videos without annotated ground truth. DeNVeR uses optical flow and layer separation, enhancing segmentation accuracy and adaptability through test-time training. A key component of our research is the introduction of the XACV dataset, the first X-ray angiography coronary video dataset with high-quality, manually labeled segmentation ground truth. Our evaluation demonstrates that DeNVeR outperforms current state-of-the-art methods in vessel segmentation. This paper marks an advance in medical imaging, providing a robust, data-efficient tool for disease diagnosis and treatment planning and setting a new standard for future research in video vessel segmentation. See our project page for video results at https://kirito878.github.io/DeNVeR/.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
Modeling the distribution of insulin in pancreas
Authors:
Changbing Hu,
Junyuan Yang,
James D. Johnson,
Jiaxu Li
Abstract:
Maintenance of adequate physical and functional pancreatic $β$-cell mass is critical for the prevention or delay of diabetes mellitus. It is well established that insulin potently activates mitogenic and anti-apoptotic signaling cascades in cultured $β$-cells. Loss of $β$-cell insulin receptors is sufficient to induce type 2 diabetes in mice. However, it remains unclear whether the {\em in vitro}…
▽ More
Maintenance of adequate physical and functional pancreatic $β$-cell mass is critical for the prevention or delay of diabetes mellitus. It is well established that insulin potently activates mitogenic and anti-apoptotic signaling cascades in cultured $β$-cells. Loss of $β$-cell insulin receptors is sufficient to induce type 2 diabetes in mice. However, it remains unclear whether the {\em in vitro} effect in human islets and the {\em in vivo} effects in mice can be applied to human physiology. The major obstacle to a complete understanding of the effects of insulin's feedback in human pancreas is the absence of technology to measure the concentrations of insulin inside of pancreas. To contextualize recent {\em in vitro} data, it is essential to know the local concentration and distribution of insulin in pancreas. To this end, we continue to estimate the local insulin concentration within pancreas. In this paper, we investigate the distribution of insulin concentration along the pancreatic vein through a novel mathematical modeling approach using existing physiological data and islet imaging data, in contrast to our previous work focusing on the insulin level within an islet. Our studies suggest that, in response to an increase in glucose, the insulin concentration along the pancreatic vein increases nearly linearly in the fashion of increasing quicker in tail area but slower in head area depending of the initial distribution.
△ Less
Submitted 1 June, 2024;
originally announced June 2024.
-
Exploring Vulnerabilities and Protections in Large Language Models: A Survey
Authors:
Frank Weizhen Liu,
Chenhui Hu
Abstract:
As Large Language Models (LLMs) increasingly become key components in various AI applications, understanding their security vulnerabilities and the effectiveness of defense mechanisms is crucial. This survey examines the security challenges of LLMs, focusing on two main areas: Prompt Hacking and Adversarial Attacks, each with specific types of threats. Under Prompt Hacking, we explore Prompt Injec…
▽ More
As Large Language Models (LLMs) increasingly become key components in various AI applications, understanding their security vulnerabilities and the effectiveness of defense mechanisms is crucial. This survey examines the security challenges of LLMs, focusing on two main areas: Prompt Hacking and Adversarial Attacks, each with specific types of threats. Under Prompt Hacking, we explore Prompt Injection and Jailbreaking Attacks, discussing how they work, their potential impacts, and ways to mitigate them. Similarly, we analyze Adversarial Attacks, breaking them down into Data Poisoning Attacks and Backdoor Attacks. This structured examination helps us understand the relationships between these vulnerabilities and the defense strategies that can be implemented. The survey highlights these security challenges and discusses robust defensive frameworks to protect LLMs against these threats. By detailing these security issues, the survey contributes to the broader discussion on creating resilient AI systems that can resist sophisticated attacks.
△ Less
Submitted 31 May, 2024;
originally announced June 2024.
-
Visualizing the microscopic origins of topology in twisted molybdenum ditelluride
Authors:
Ellis Thompson,
Keng Tou Chu,
Florie Mesple,
Xiao-Wei Zhang,
Chaowei Hu,
Yuzhou Zhao,
Heonjoon Park,
Jiaqi Cai,
Eric Anderson,
Kenji Watanabe,
Takashi Taniguchi,
Jihui Yang,
Jiun-Haw Chu,
Xiaodong Xu,
Ting Cao,
Di Xiao,
Matthew Yankowitz
Abstract:
In moiré materials with flat electronic bands and suitable quantum geometry, strong correlations can give rise to novel topological states of matter. The nontrivial band topology of twisted molybdenum ditelluride (tMoTe$_2$) -- responsible for its fractional quantum anomalous Hall (FQAH) states -- is predicted to arise from a layer-pseudospin skyrmion lattice. Tracing the layer polarization of wav…
▽ More
In moiré materials with flat electronic bands and suitable quantum geometry, strong correlations can give rise to novel topological states of matter. The nontrivial band topology of twisted molybdenum ditelluride (tMoTe$_2$) -- responsible for its fractional quantum anomalous Hall (FQAH) states -- is predicted to arise from a layer-pseudospin skyrmion lattice. Tracing the layer polarization of wavefunctions within the moiré unit cell can thus offer crucial insights into the band topology. Here, we use scanning tunneling microscopy and spectroscopy (STM/S) to probe the layer-pseudospin skyrmion textures of tMoTe$_2$. We do this by simultaneously visualizing the moiré lattice structure and the spatial localization of its electronic states. We find that the wavefunctions associated with the topological flat bands exhibit a spatially-dependent layer polarization within the moiré unit cell. This is in excellent agreement with our theoretical modeling, thereby revealing a direct microscopic connection between the structural properties of tMoTe$_2$ and its band topology. Our work enables new pathways for engineering FQAH states with strain, as well as future STM studies of the intertwined correlated and topological states arising in gate-tunable devices.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
An Overview of Machine Learning-Enabled Optimization for Reconfigurable Intelligent Surfaces-Aided 6G Networks: From Reinforcement Learning to Large Language Models
Authors:
Hao Zhou,
Chengming Hu,
Xue Liu
Abstract:
Reconfigurable intelligent surface (RIS) becomes a promising technique for 6G networks by reshaping signal propagation in smart radio environments. However, it also leads to significant complexity for network management due to the large number of elements and dedicated phase-shift optimization. In this work, we provide an overview of machine learning (ML)-enabled optimization for RIS-aided 6G netw…
▽ More
Reconfigurable intelligent surface (RIS) becomes a promising technique for 6G networks by reshaping signal propagation in smart radio environments. However, it also leads to significant complexity for network management due to the large number of elements and dedicated phase-shift optimization. In this work, we provide an overview of machine learning (ML)-enabled optimization for RIS-aided 6G networks. In particular, we focus on various reinforcement learning (RL) techniques, e.g., deep Q-learning, multi-agent reinforcement learning, transfer reinforcement learning, hierarchical reinforcement learning, and offline reinforcement learning. Different from existing studies, this work further discusses how large language models (LLMs) can be combined with RL to handle network optimization problems. It shows that LLM offers new opportunities to enhance the capabilities of RL algorithms in terms of generalization, reward function design, multi-modal information processing, etc. Finally, we identify the future challenges and directions of ML-enabled optimization for RIS-aided 6G networks.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
Nonreciprocal Superradiant Phase Transitions and Multicriticality in a Cavity QED System
Authors:
Gui-Lei Zhu,
Chang-Sheng Hu,
Wei Qin,
Xin-You Lü,
Franco Nori
Abstract:
We demonstrate the emergence of nonreciprocal superradiant phase transitions and novel multicriticality in a cavity quantum electrodynamics (QED) system, where a two-level atom interacts with two counter-propagating modes of a whispering-gallery-mode (WGM) microcavity. The cavity rotates at a certain angular velocity, and is directionally squeezed by a unidirectional parametric pumping $χ^{(2)}$ n…
▽ More
We demonstrate the emergence of nonreciprocal superradiant phase transitions and novel multicriticality in a cavity quantum electrodynamics (QED) system, where a two-level atom interacts with two counter-propagating modes of a whispering-gallery-mode (WGM) microcavity. The cavity rotates at a certain angular velocity, and is directionally squeezed by a unidirectional parametric pumping $χ^{(2)}$ nonlinearity. The combination of cavity rotation and directional squeezing leads to nonreciprocal first- and second-order superradiant phase transitions. These transitions do not require ultrastrong atom-field couplings and can be easily controlled by the external pump field. Through a full quantum description of the system Hamiltonian, we identify two types of multicritical points in the phase diagram, both of which exhibit controllable nonreciprocity. These results open a new door for all-optical manipulation of superradiant transitions and multicritical behaviors in light-matter systems, with potential applications in engineering various integrated nonreciprocal quantum devices
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning
Authors:
Yuwen Pu,
Zhuoyuan Ding,
Jiahao Chen,
Chunyi Zhou,
Qingming Li,
Chunqiang Hu,
Shouling Ji
Abstract:
As a novel privacy-preserving paradigm aimed at reducing client computational costs and achieving data utility, split learning has garnered extensive attention and proliferated widespread applications across various fields, including smart health and smart transportation, among others. While recent studies have primarily concentrated on addressing privacy leakage concerns in split learning, such a…
▽ More
As a novel privacy-preserving paradigm aimed at reducing client computational costs and achieving data utility, split learning has garnered extensive attention and proliferated widespread applications across various fields, including smart health and smart transportation, among others. While recent studies have primarily concentrated on addressing privacy leakage concerns in split learning, such as inference attacks and data reconstruction, the exploration of security issues (e.g., backdoor attacks) within the framework of split learning has been comparatively limited. Nonetheless, the security vulnerability within the context of split learning is highly posing a threat and can give rise to grave security implications, such as the illegal impersonation in the face recognition model. Therefore, in this paper, we propose a stealthy backdoor attack strategy (namely SBAT) tailored to the without-label-sharing split learning architecture, which unveils the inherent security vulnerability of split learning. We posit the existence of a potential attacker on the server side aiming to introduce a backdoor into the training model, while exploring two scenarios: one with known client network architecture and the other with unknown architecture. Diverging from traditional backdoor attack methods that manipulate the training data and labels, we constructively conduct the backdoor attack by injecting the trigger embedding into the server network. Specifically, our SBAT achieves a higher level of attack stealthiness by refraining from modifying any intermediate parameters (e.g., gradients) during training and instead executing all malicious operations post-training.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data?
Authors:
Yuwen Pu,
Jiahao Chen,
Chunyi Zhou,
Zhou Feng,
Qingming Li,
Chunqiang Hu,
Shouling Ji
Abstract:
Backdoor attacks have attracted wide attention from academia and industry due to their great security threat to deep neural networks (DNN). Most of the existing methods propose to conduct backdoor attacks by poisoning the training dataset with different strategies, so it's critical to identify the poisoned samples and then train a clean model on the unreliable dataset in the context of defending b…
▽ More
Backdoor attacks have attracted wide attention from academia and industry due to their great security threat to deep neural networks (DNN). Most of the existing methods propose to conduct backdoor attacks by poisoning the training dataset with different strategies, so it's critical to identify the poisoned samples and then train a clean model on the unreliable dataset in the context of defending backdoor attacks. Although numerous backdoor countermeasure researches are proposed, their inherent weaknesses render them limited in practical scenarios, such as the requirement of enough clean samples, unstable defense performance under various attack conditions, poor defense performance against adaptive attacks, and so on.Therefore, in this paper, we are committed to overcome the above limitations and propose a more practical backdoor defense method. Concretely, we first explore the inherent relationship between the potential perturbations and the backdoor trigger, and the theoretical analysis and experimental results demonstrate that the poisoned samples perform more robustness to perturbation than the clean ones. Then, based on our key explorations, we introduce AdvrBD, an Adversarial perturbation-based and robust Backdoor Defense framework, which can effectively identify the poisoned samples and train a clean model on the poisoned dataset. Constructively, our AdvrBD eliminates the requirement for any clean samples or knowledge about the poisoned dataset (e.g., poisoning ratio), which significantly improves the practicality in real-world scenarios.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Energy-Efficient Federated Edge Learning with Streaming Data: A Lyapunov Optimization Approach
Authors:
Chung-Hsuan Hu,
Zheng Chen,
Erik G. Larsson
Abstract:
Federated learning (FL) has received significant attention in recent years for its advantages in efficient training of machine learning models across distributed clients without disclosing user-sensitive data. Specifically, in federated edge learning (FEEL) systems, the time-varying nature of wireless channels introduces inevitable system dynamics in the communication process, thereby affecting tr…
▽ More
Federated learning (FL) has received significant attention in recent years for its advantages in efficient training of machine learning models across distributed clients without disclosing user-sensitive data. Specifically, in federated edge learning (FEEL) systems, the time-varying nature of wireless channels introduces inevitable system dynamics in the communication process, thereby affecting training latency and energy consumption. In this work, we further consider a streaming data scenario where new training data samples are randomly generated over time at edge devices. Our goal is to develop a dynamic scheduling and resource allocation algorithm to address the inherent randomness in data arrivals and resource availability under long-term energy constraints. To achieve this, we formulate a stochastic network optimization problem and use the Lyapunov drift-plus-penalty framework to obtain a dynamic resource management design. Our proposed algorithm makes adaptive decisions on device scheduling, computational capacity adjustment, and allocation of bandwidth and transmit power in every round. We provide convergence analysis for the considered setting with heterogeneous data and time-varying objective functions, which supports the rationale behind our proposed scheduling design. The effectiveness of our scheme is verified through simulation results, demonstrating improved learning performance and energy efficiency as compared to baseline schemes.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Data quality control system and long-term performance monitor of the LHAASO-KM2A
Authors:
Zhen Cao,
F. Aharonian,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
W. Bian,
A. V. Bukevich,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
H. X. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. Chen
, et al. (263 additional authors not shown)
Abstract:
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To…
▽ More
The KM2A is the largest sub-array of the Large High Altitude Air Shower Observatory (LHAASO). It consists of 5216 electromagnetic particle detectors (EDs) and 1188 muon detectors (MDs). The data recorded by the EDs and MDs are used to reconstruct primary information of cosmic ray and gamma-ray showers. This information is used for physical analysis in gamma-ray astronomy and cosmic ray physics. To ensure the reliability of the LHAASO-KM2A data, a three-level quality control system has been established. It is used to monitor the status of detector units, stability of reconstructed parameters and the performance of the array based on observations of the Crab Nebula and Moon shadow. This paper will introduce the control system and its application on the LHAASO-KM2A data collected from August 2021 to July 2023. During this period, the pointing and angular resolution of the array were stable. From the observations of the Moon shadow and Crab Nebula, the results achieved using the two methods are consistent with each other. According to the observation of the Crab Nebula at energies from 25 TeV to 100 TeV, the time averaged pointing errors are estimated to be $-0.003^{\circ} \pm 0.005^{\circ}$ and $0.001^{\circ} \pm 0.006^{\circ}$ in the R.A. and Dec directions, respectively.
△ Less
Submitted 13 June, 2024; v1 submitted 20 May, 2024;
originally announced May 2024.
-
Large Language Model (LLM) for Telecommunications: A Comprehensive Survey on Principles, Key Techniques, and Opportunities
Authors:
Hao Zhou,
Chengming Hu,
Ye Yuan,
Yufei Cui,
Yili Jin,
Can Chen,
Haolun Wu,
Dun Yuan,
Li Jiang,
Di Wu,
Xue Liu,
Charlie Zhang,
Xianbin Wang,
Jiangchuan Liu
Abstract:
Large language models (LLMs) have received considerable attention recently due to their outstanding comprehension and reasoning capabilities, leading to great progress in many fields. The advancement of LLM techniques also offers promising opportunities to automate many tasks in the telecommunication (telecom) field. After pre-training and fine-tuning, LLMs can perform diverse downstream tasks bas…
▽ More
Large language models (LLMs) have received considerable attention recently due to their outstanding comprehension and reasoning capabilities, leading to great progress in many fields. The advancement of LLM techniques also offers promising opportunities to automate many tasks in the telecommunication (telecom) field. After pre-training and fine-tuning, LLMs can perform diverse downstream tasks based on human instructions, paving the way to artificial general intelligence (AGI)-enabled 6G. Given the great potential of LLM technologies, this work aims to provide a comprehensive overview of LLM-enabled telecom networks. In particular, we first present LLM fundamentals, including model architecture, pre-training, fine-tuning, inference and utilization, model evaluation, and telecom deployment. Then, we introduce LLM-enabled key techniques and telecom applications in terms of generation, classification, optimization, and prediction problems. Specifically, the LLM-enabled generation applications include telecom domain knowledge, code, and network configuration generation. After that, the LLM-based classification applications involve network security, text, image, and traffic classification problems. Moreover, multiple LLM-enabled optimization techniques are introduced, such as automated reward function design for reinforcement learning and verbal reinforcement learning. Furthermore, for LLM-aided prediction problems, we discussed time-series prediction models and multi-modality prediction problems for telecom. Finally, we highlight the challenges and identify the future directions of LLM-enabled telecom networks.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
Interference between distinguishable photons
Authors:
Manman Wang,
Yanfeng Li,
Hanqing Liu,
Haiqiao Ni,
Zhichuan Niu,
Chengyong Hu
Abstract:
Two-photon interference (TPI) lies at the heart of photonic quantum technologies. TPI is generally regarded as quantum interference stemming from the indistinguishability of identical photons, hence a common intuition prevails that TPI would disappear if photons are distinguishable. Here we disprove this perspective and uncover the essence of TPI. We report the first demonstration of TPI between d…
▽ More
Two-photon interference (TPI) lies at the heart of photonic quantum technologies. TPI is generally regarded as quantum interference stemming from the indistinguishability of identical photons, hence a common intuition prevails that TPI would disappear if photons are distinguishable. Here we disprove this perspective and uncover the essence of TPI. We report the first demonstration of TPI between distinguishable photons with their frequency separation up to $10^4$ times larger than their linewidths. We perform time-resolved TPI between an independent laser and single photons with ultralong coherence time ($>10\ μ$s). We observe a maximum TPI visibility of $72\%\pm 2\%$ well above the $50\%$ classical limit indicating the quantum feature, and simultaneously a broad visibility background and a classical beat visibility of less than $50\%$ reflecting the classical feature. These visibilities are independent of the photon frequency separation and show no difference between distinguishable and indistinguishable photons. Based on a general wave superposition model, we derive the cross-correlation functions which fully reproduce and explain the experiments. Our results reveal that TPI as the fourth-order interference arises from the second-order interference of two photons within the mutual coherence time and TPI is not linked to the photon indistinguishability. This work provides new insights into the nature of TPI with great implications in both quantum optics and photonic quantum technologies.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Facilitating Feature and Topology Lightweighting: An Ethereum Transaction Graph Compression Method for Malicious Account Detection
Authors:
Jiajun Zhou,
Xuanze Chen,
Shengbo Gong,
Chenkai Hu,
Chengxiang Jin,
Shanqing Yu,
Qi Xuan
Abstract:
Ethereum has become one of the primary global platforms for cryptocurrency, playing an important role in promoting the diversification of the financial ecosystem. However, the relative lag in regulation has led to a proliferation of malicious activities in Ethereum, posing a serious threat to fund security. Existing regulatory methods usually detect malicious accounts through feature engineering o…
▽ More
Ethereum has become one of the primary global platforms for cryptocurrency, playing an important role in promoting the diversification of the financial ecosystem. However, the relative lag in regulation has led to a proliferation of malicious activities in Ethereum, posing a serious threat to fund security. Existing regulatory methods usually detect malicious accounts through feature engineering or large-scale transaction graph mining. However, due to the immense scale of transaction data and malicious attacks, these methods suffer from inefficiency and low robustness during data processing and anomaly detection. In this regard, we propose an Ethereum Transaction Graph Compression method named TGC4Eth, which assists malicious account detection by lightweighting both features and topology of the transaction graph. At the feature level, we select transaction features based on their low importance to improve the robustness of the subsequent detection models against feature evasion attacks; at the topology level, we employ focusing and coarsening processes to compress the structure of the transaction graph, thereby improving both data processing and inference efficiency of detection models. Extensive experiments demonstrate that TGC4Eth significantly improves the computational efficiency of existing detection models while preserving the connectivity of the transaction graph. Furthermore, TGC4Eth enables existing detection models to maintain stable performance and exhibit high robustness against feature evasion attacks.
△ Less
Submitted 1 July, 2024; v1 submitted 13 May, 2024;
originally announced May 2024.
-
Discovery of Very-high-energy Gamma-ray Emissions from the Low Luminosity AGN NGC 4278 by LHAASO
Authors:
Zhen Cao,
F. Aharonian,
Q. An,
Axikegu,
Y. X. Bai,
Y. W. Bao,
D. Bastieri,
X. J. Bi,
Y. J. Bi,
J. T. Cai,
Q. Cao,
W. Y. Cao,
Zhe Cao,
J. Chang,
J. F. Chang,
A. M. Chen,
E. S. Chen,
Liang Chen,
Lin Chen,
Long Chen,
M. J. Chen,
M. L. Chen,
Q. H. Chen,
S. H. Chen,
S. Z. Chen
, et al. (255 additional authors not shown)
Abstract:
The first source catalog of Large High Altitude Air Shower Observatory reported the detection of a very-high-energy gamma ray source, 1LHAASO J1219+2915. In this paper a further detailed study of the spectral and temporal behavior of this point-like source have been carried. The best-fit position of the TeV source ($\rm{RA}=185.05^{\circ}\pm0.04^{\circ}$, $\rm{Dec}=29.25^{\circ}\pm0.03^{\circ}$) i…
▽ More
The first source catalog of Large High Altitude Air Shower Observatory reported the detection of a very-high-energy gamma ray source, 1LHAASO J1219+2915. In this paper a further detailed study of the spectral and temporal behavior of this point-like source have been carried. The best-fit position of the TeV source ($\rm{RA}=185.05^{\circ}\pm0.04^{\circ}$, $\rm{Dec}=29.25^{\circ}\pm0.03^{\circ}$) is compatible with NGC 4278 within $\sim0.03$ degree. Variation analysis shows an indication of the variability at a few months level in the TeV band, which is consistent with low frequency observations. Based on these observations, we report the detection of TeV $γ$-ray emissions from this low-luminosity AGN NGC 4278. The observations by LHAASO-WCDA during active period has a significance level of 8.8\,$σ$ with best-fit photon spectral index $\varGamma=2.56\pm0.14$ and a flux $f_{1-10\,\rm{TeV}}=(7.0\pm1.1_{\rm{sta}}\pm0.35_{\rm{syst}})\times10^{-13}\,\rm{photons\,cm^{-2}\,s^{-1}}$, or approximately $5\%$ of the Crab Nebula. The discovery of VHE from NGC 4278 indicates that the compact, weak radio jet can efficiently accelerate particles and emit TeV photons.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Exploring Speech Pattern Disorders in Autism using Machine Learning
Authors:
Chuanbo Hu,
Jacob Thrasher,
Wenqi Li,
Mindi Ruan,
Xiangxu Yu,
Lynn K Paul,
Shuo Wang,
Xin Li
Abstract:
Diagnosing autism spectrum disorder (ASD) by identifying abnormal speech patterns from examiner-patient dialogues presents significant challenges due to the subtle and diverse manifestations of speech-related symptoms in affected individuals. This study presents a comprehensive approach to identify distinctive speech patterns through the analysis of examiner-patient dialogues. Utilizing a dataset…
▽ More
Diagnosing autism spectrum disorder (ASD) by identifying abnormal speech patterns from examiner-patient dialogues presents significant challenges due to the subtle and diverse manifestations of speech-related symptoms in affected individuals. This study presents a comprehensive approach to identify distinctive speech patterns through the analysis of examiner-patient dialogues. Utilizing a dataset of recorded dialogues, we extracted 40 speech-related features, categorized into frequency, zero-crossing rate, energy, spectral characteristics, Mel Frequency Cepstral Coefficients (MFCCs), and balance. These features encompass various aspects of speech such as intonation, volume, rhythm, and speech rate, reflecting the complex nature of communicative behaviors in ASD. We employed machine learning for both classification and regression tasks to analyze these speech features. The classification model aimed to differentiate between ASD and non-ASD cases, achieving an accuracy of 87.75%. Regression models were developed to predict speech pattern related variables and a composite score from all variables, facilitating a deeper understanding of the speech dynamics associated with ASD. The effectiveness of machine learning in interpreting intricate speech patterns and the high classification accuracy underscore the potential of computational methods in supporting the diagnostic processes for ASD. This approach not only aids in early detection but also contributes to personalized treatment planning by providing insights into the speech and communication profiles of individuals with ASD.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Mass function of stellar black holes as revealed by the LIGO-Virgo-KAGRA observations
Authors:
Xiao-Fei Dong,
Yong-Feng Huang,
Zhi-Bin Zhang,
Xiu-Juan Li,
Ze-Cheng Zou,
Chen-Ran Hu,
Chen Deng,
Yang Liu
Abstract:
Ninety gravitational wave events have been detected by the LIGO-Virgo-KAGRA network and are released in the Gravitational-Wave Transient Catalog. Among these events, 83 cases are definitely binary black hole mergers since the masses of all the objects involved significantly exceed the upper limit of neutron stars. The black holes in these merger events naturally form two interesting samples, a pre…
▽ More
Ninety gravitational wave events have been detected by the LIGO-Virgo-KAGRA network and are released in the Gravitational-Wave Transient Catalog. Among these events, 83 cases are definitely binary black hole mergers since the masses of all the objects involved significantly exceed the upper limit of neutron stars. The black holes in these merger events naturally form two interesting samples, a pre-merger sample that includes all the black holes before the mergers and a post-merger sample that consists of the black holes generated during the merging processes. The former represents black holes that once existed in the Universe, while the latter represents newly born black holes. Here we present a statistical analysis on these two samples. The non-parametric $τ$ statistic method is adopted to correct for the observational selection effect. The Lynden-Bell's $C^{-}$ method is further applied to derive the mass distribution and density function of black holes. It is found that the mass distribution can be expressed as a broken power-law function. More interestingly, the power-law index in the high mass region is comparable for the two samples. The number density of black holes is found to depend on redshift as $ρ(z) \propto z^{-2.06}$-$z^{-2.12}$ based on the two samples. Implications of these findings on the origin of black holes are discussed.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
MatterSim: A Deep Learning Atomistic Model Across Elements, Temperatures and Pressures
Authors:
Han Yang,
Chenxi Hu,
Yichi Zhou,
Xixian Liu,
Yu Shi,
Jielan Li,
Guanzhi Li,
Zekun Chen,
Shuizhou Chen,
Claudio Zeni,
Matthew Horton,
Robert Pinsler,
Andrew Fowler,
Daniel Zügner,
Tian Xie,
Jake Smith,
Lixin Sun,
Qian Wang,
Lingyu Kong,
Chang Liu,
Hongxia Hao,
Ziheng Lu
Abstract:
Accurate and fast prediction of materials properties is central to the digital transformation of materials design. However, the vast design space and diverse operating conditions pose significant challenges for accurately modeling arbitrary material candidates and forecasting their properties. We present MatterSim, a deep learning model actively learned from large-scale first-principles computatio…
▽ More
Accurate and fast prediction of materials properties is central to the digital transformation of materials design. However, the vast design space and diverse operating conditions pose significant challenges for accurately modeling arbitrary material candidates and forecasting their properties. We present MatterSim, a deep learning model actively learned from large-scale first-principles computations, for efficient atomistic simulations at first-principles level and accurate prediction of broad material properties across the periodic table, spanning temperatures from 0 to 5000 K and pressures up to 1000 GPa. Out-of-the-box, the model serves as a machine learning force field, and shows remarkable capabilities not only in predicting ground-state material structures and energetics, but also in simulating their behavior under realistic temperatures and pressures, signifying an up to ten-fold enhancement in precision compared to the prior best-in-class. This enables MatterSim to compute materials' lattice dynamics, mechanical and thermodynamic properties, and beyond, to an accuracy comparable with first-principles methods. Specifically, MatterSim predicts Gibbs free energies for a wide range of inorganic solids with near-first-principles accuracy and achieves a 15 meV/atom resolution for temperatures up to 1000K compared with experiments. This opens an opportunity to predict experimental phase diagrams of materials at minimal computational cost. Moreover, MatterSim also serves as a platform for continuous learning and customization by integrating domain-specific data. The model can be fine-tuned for atomistic simulations at a desired level of theory or for direct structure-to-property predictions, achieving high data efficiency with a reduction in data requirements by up to 97%.
△ Less
Submitted 10 May, 2024; v1 submitted 8 May, 2024;
originally announced May 2024.
-
Exploiting ChatGPT for Diagnosing Autism-Associated Language Disorders and Identifying Distinct Features
Authors:
Chuanbo Hu,
Wenqi Li,
Mindi Ruan,
Xiangxu Yu,
Lynn K. Paul,
Shuo Wang,
Xin Li
Abstract:
Diagnosing language disorders associated with autism is a complex and nuanced challenge, often hindered by the subjective nature and variability of traditional assessment methods. Traditional diagnostic methods not only require intensive human effort but also often result in delayed interventions due to their lack of speed and specificity. In this study, we explored the application of ChatGPT, a s…
▽ More
Diagnosing language disorders associated with autism is a complex and nuanced challenge, often hindered by the subjective nature and variability of traditional assessment methods. Traditional diagnostic methods not only require intensive human effort but also often result in delayed interventions due to their lack of speed and specificity. In this study, we explored the application of ChatGPT, a state of the art large language model, to overcome these obstacles by enhancing diagnostic accuracy and profiling specific linguistic features indicative of autism. Leveraging ChatGPT advanced natural language processing capabilities, this research aims to streamline and refine the diagnostic process. Specifically, we compared ChatGPT's performance with that of conventional supervised learning models, including BERT, a model acclaimed for its effectiveness in various natural language processing tasks. We showed that ChatGPT substantially outperformed these models, achieving over 13% improvement in both accuracy and F1 score in a zero shot learning configuration. This marked enhancement highlights the model potential as a superior tool for neurological diagnostics. Additionally, we identified ten distinct features of autism associated language disorders that vary significantly across different experimental scenarios. These features, which included echolalia, pronoun reversal, and atypical language usage, were crucial for accurately diagnosing ASD and customizing treatment plans. Together, our findings advocate for adopting sophisticated AI tools like ChatGPT in clinical settings to assess and diagnose developmental disorders. Our approach not only promises greater diagnostic precision but also aligns with the goals of personalized medicine, potentially transforming the evaluation landscape for autism and similar neurological conditions.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
From Persona to Personalization: A Survey on Role-Playing Language Agents
Authors:
Jiangjie Chen,
Xintao Wang,
Rui Xu,
Siyu Yuan,
Yikai Zhang,
Wei Shi,
Jian Xie,
Shuang Li,
Ruihan Yang,
Tinghui Zhu,
Aili Chen,
Nianqi Li,
Lida Chen,
Caiyu Hu,
Siye Wu,
Scott Ren,
Ziquan Fu,
Yanghua Xiao
Abstract:
Recent advancements in large language models (LLMs) have significantly boosted the rise of Role-Playing Language Agents (RPLAs), i.e., specialized AI systems designed to simulate assigned personas. By harnessing multiple advanced abilities of LLMs, including in-context learning, instruction following, and social intelligence, RPLAs achieve a remarkable sense of human likeness and vivid role-playin…
▽ More
Recent advancements in large language models (LLMs) have significantly boosted the rise of Role-Playing Language Agents (RPLAs), i.e., specialized AI systems designed to simulate assigned personas. By harnessing multiple advanced abilities of LLMs, including in-context learning, instruction following, and social intelligence, RPLAs achieve a remarkable sense of human likeness and vivid role-playing performance. RPLAs can mimic a wide range of personas, ranging from historical figures and fictional characters to real-life individuals. Consequently, they have catalyzed numerous AI applications, such as emotional companions, interactive video games, personalized assistants and copilots, and digital clones. In this paper, we conduct a comprehensive survey of this field, illustrating the evolution and recent progress in RPLAs integrating with cutting-edge LLM technologies. We categorize personas into three types: 1) Demographic Persona, which leverages statistical stereotypes; 2) Character Persona, focused on well-established figures; and 3) Individualized Persona, customized through ongoing user interactions for personalized services. We begin by presenting a comprehensive overview of current methodologies for RPLAs, followed by the details for each persona type, covering corresponding data sourcing, agent construction, and evaluation. Afterward, we discuss the fundamental risks, existing limitations, and future prospects of RPLAs. Additionally, we provide a brief review of RPLAs in AI applications, which reflects practical user demands that shape and drive RPLA research. Through this work, we aim to establish a clear taxonomy of RPLA research and applications, and facilitate future research in this critical and ever-evolving field, and pave the way for a future where humans and RPLAs coexist in harmony.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Single crystal growth, chemical defects, magnetic and transport properties of antiferromagnetic topological insulators (Ge$_{1-δ-x}$Mn$_x$)$_2$Bi$_2$Te$_5$ ($x\leq 0.47$, $0.11 \leq δ\leq 0.20$)
Authors:
Tiema Qian,
Chaowei Hu,
Jazmine C. Green,
Erxi Feng,
Huibo Cao,
Ni Ni
Abstract:
Magnetic topological insulators provide a platform for emergent phenomena arising from the interplay between magnetism and band topology. Here we report the single crystal growth, crystal structure, magnetic and transport properties, as well as the neutron scattering studies of topological insulator series (Ge$_{1-δ-x}$Mn$_x$)$_2$Bi$_2$Te$_5$ ($x\leq 0.47$, $0.11 \leq δ\leq 0.20$). Upon doping up…
▽ More
Magnetic topological insulators provide a platform for emergent phenomena arising from the interplay between magnetism and band topology. Here we report the single crystal growth, crystal structure, magnetic and transport properties, as well as the neutron scattering studies of topological insulator series (Ge$_{1-δ-x}$Mn$_x$)$_2$Bi$_2$Te$_5$ ($x\leq 0.47$, $0.11 \leq δ\leq 0.20$). Upon doping up to $x = 0.47$, the lattice parameter $c$ decreases by 0.8\%, while the lattice parameter $a$ remains nearly unchanged. Significant Ge vacancies and Ge/Bi site mixing are revealed via elemental analysis as well as refinements of the neutron and X-ray diffraction data, resulting in holes dominating the charge transport. At $x = 0.47$, below 10.8 K, a bilayer A-type antiferromagnetic ordered state emerges, featuring an ordered moment of 3.0(3) $μ_{B}$/Mn at 5 K, with the $c$ axis as the easy axis. Magnetization data unveil a much stronger interlayer antiferromagnetic exchange interaction and a much smaller uniaxial anisotropy compared to MnBi$_{2}$Te$_{4}$. We attribute the former to the shorter superexchange path and the latter to the smaller ligand-field splitting in (Ge$_{1-δ-x}$Mn$_x$)$_2$Bi$_2$Te$_5$. Our study demonstrates that this series of materials holds promise for the investigation of the Layer Hall effect and quantum metric nonlinear Hall effect.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
Stimulated Emission Depletion (STED) Magnetic Particle Imaging
Authors:
Guang Jia,
Zhongwei Bian,
Tianshu Li,
Shi Bai,
Chenxing Hu,
Lixuan Zhao,
Peng Gao,
Tanping Li,
Hui Hui,
Jie Tian
Abstract:
Magnetic particle imaging (MPI) is an in-vivo imaging method to detect magnetic nanoparticles for blood vessel imaging and molecular target imaging. Compared with conventional molecular imaging devices (such as nuclear medicine imaging PET and SPECT), magnetic nanoparticles have longer storage periods than radionuclides without ionizing radiation. MPI has higher detection sensitivity compared with…
▽ More
Magnetic particle imaging (MPI) is an in-vivo imaging method to detect magnetic nanoparticles for blood vessel imaging and molecular target imaging. Compared with conventional molecular imaging devices (such as nuclear medicine imaging PET and SPECT), magnetic nanoparticles have longer storage periods than radionuclides without ionizing radiation. MPI has higher detection sensitivity compared with MRI. To accurately locate molecular probes in living organisms, high-resolution images are needed to meet the requirements of precision medicine. The spatial resolution of the latest domestic and international MPI equipment is 1-6 mm and has not yet met the requirements of medical imaging detection. We previously studied the spatial encoding technology based on pulsed square wave stimulation, which significantly improved the image resolution along the field free line (FFL) direction. This study proposes an innovative idea of high-resolution MPI based on stimulated emission depletion (STED) of magnetic nanoparticle signals. The stimulated emission was implemented by using cosine stimulation on FFL-based MPI scanner systems. The STED signal was generated by adding an offset magnetic field parallel to the FFL, which may form a donut-shaped focal spot or a regular Gaussian focal spot depending on the offset field strength. Focal spot modulation techniques and deconvolution algorithms were developed to improve image resolution.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
An Element-Wise Weights Aggregation Method for Federated Learning
Authors:
Yi Hu,
Hanchi Ren,
Chen Hu,
Jingjing Deng,
Xianghua Xie
Abstract:
Federated learning (FL) is a powerful Machine Learning (ML) paradigm that enables distributed clients to collaboratively learn a shared global model while keeping the data on the original device, thereby preserving privacy. A central challenge in FL is the effective aggregation of local model weights from disparate and potentially unbalanced participating clients. Existing methods often treat each…
▽ More
Federated learning (FL) is a powerful Machine Learning (ML) paradigm that enables distributed clients to collaboratively learn a shared global model while keeping the data on the original device, thereby preserving privacy. A central challenge in FL is the effective aggregation of local model weights from disparate and potentially unbalanced participating clients. Existing methods often treat each client indiscriminately, applying a single proportion to the entire local model. However, it is empirically advantageous for each weight to be assigned a specific proportion. This paper introduces an innovative Element-Wise Weights Aggregation Method for Federated Learning (EWWA-FL) aimed at optimizing learning performance and accelerating convergence speed. Unlike traditional FL approaches, EWWA-FL aggregates local weights to the global model at the level of individual elements, thereby allowing each participating client to make element-wise contributions to the learning process. By taking into account the unique dataset characteristics of each client, EWWA-FL enhances the robustness of the global model to different datasets while also achieving rapid convergence. The method is flexible enough to employ various weighting strategies. Through comprehensive experiments, we demonstrate the advanced capabilities of EWWA-FL, showing significant improvements in both accuracy and convergence speed across a range of backbones and benchmarks.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Evolutionary Reinforcement Learning via Cooperative Coevolution
Authors:
Chengpeng Hu,
Jialin Liu,
Xin Yao
Abstract:
Recently, evolutionary reinforcement learning has obtained much attention in various domains. Maintaining a population of actors, evolutionary reinforcement learning utilises the collected experiences to improve the behaviour policy through efficient exploration. However, the poor scalability of genetic operators limits the efficiency of optimising high-dimensional neural networks. To address this…
▽ More
Recently, evolutionary reinforcement learning has obtained much attention in various domains. Maintaining a population of actors, evolutionary reinforcement learning utilises the collected experiences to improve the behaviour policy through efficient exploration. However, the poor scalability of genetic operators limits the efficiency of optimising high-dimensional neural networks. To address this issue, this paper proposes a novel cooperative coevolutionary reinforcement learning (CoERL) algorithm. Inspired by cooperative coevolution, CoERL periodically and adaptively decomposes the policy optimisation problem into multiple subproblems and evolves a population of neural networks for each of the subproblems. Instead of using genetic operators, CoERL directly searches for partial gradients to update the policy. Updating policy with partial gradients maintains consistency between the behaviour spaces of parents and offspring across generations. The experiences collected by the population are then used to improve the entire policy, which enhances the sampling efficiency. Experiments on six benchmark locomotion tasks demonstrate that CoERL outperforms seven state-of-the-art algorithms and baselines. Ablation study verifies the unique contribution of CoERL's core ingredients.
△ Less
Submitted 29 April, 2024; v1 submitted 23 April, 2024;
originally announced April 2024.