-
A CNN with Noise Inclined Module and Denoise Framework for Hyperspectral Image Classification
Authors:
Zhiqiang Gong,
Ping Zhong,
Jiahao Qi,
Panhe Hu
Abstract:
Deep Neural Networks have been successfully applied in hyperspectral image classification. However, most of prior works adopt general deep architectures while ignore the intrinsic structure of the hyperspectral image, such as the physical noise generation. This would make these deep models unable to generate discriminative features and provide impressive classification performance. To leverage suc…
▽ More
Deep Neural Networks have been successfully applied in hyperspectral image classification. However, most of prior works adopt general deep architectures while ignore the intrinsic structure of the hyperspectral image, such as the physical noise generation. This would make these deep models unable to generate discriminative features and provide impressive classification performance. To leverage such intrinsic information, this work develops a novel deep learning framework with the noise inclined module and denoise framework for hyperspectral image classification. First, we model the spectral signature of hyperspectral image with the physical noise model to describe the high intraclass variance of each class and great overlapping between different classes in the image. Then, a noise inclined module is developed to capture the physical noise within each object and a denoise framework is then followed to remove such noise from the object. Finally, the CNN with noise inclined module and the denoise framework is developed to obtain discriminative features and provides good classification performance of hyperspectral image. Experiments are conducted over two commonly used real-world datasets and the experimental results show the effectiveness of the proposed method. The implementation of the proposed method and other compared methods could be accessed at https://github.com/shendu-sw/noise-physical-framework.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
OPQ: Compressing Deep Neural Networks with One-shot Pruning-Quantization
Authors:
Peng Hu,
Xi Peng,
Hongyuan Zhu,
Mohamed M. Sabry Aly,
Jie Lin
Abstract:
As Deep Neural Networks (DNNs) usually are overparameterized and have millions of weight parameters, it is challenging to deploy these large DNN models on resource-constrained hardware platforms, e.g., smartphones. Numerous network compression methods such as pruning and quantization are proposed to reduce the model size significantly, of which the key is to find suitable compression allocation (e…
▽ More
As Deep Neural Networks (DNNs) usually are overparameterized and have millions of weight parameters, it is challenging to deploy these large DNN models on resource-constrained hardware platforms, e.g., smartphones. Numerous network compression methods such as pruning and quantization are proposed to reduce the model size significantly, of which the key is to find suitable compression allocation (e.g., pruning sparsity and quantization codebook) of each layer. Existing solutions obtain the compression allocation in an iterative/manual fashion while finetuning the compressed model, thus suffering from the efficiency issue. Different from the prior art, we propose a novel One-shot Pruning-Quantization (OPQ) in this paper, which analytically solves the compression allocation with pre-trained weight parameters only. During finetuning, the compression module is fixed and only weight parameters are updated. To our knowledge, OPQ is the first work that reveals pre-trained model is sufficient for solving pruning and quantization simultaneously, without any complex iterative/manual optimization at the finetuning stage. Furthermore, we propose a unified channel-wise quantization method that enforces all channels of each layer to share a common codebook, which leads to low bit-rate allocation without introducing extra overhead brought by traditional channel-wise quantization. Comprehensive experiments on ImageNet with AlexNet/MobileNet-V1/ResNet-50 show that our method improves accuracy and training efficiency while obtains significantly higher compression rates compared to the state-of-the-art.
△ Less
Submitted 23 May, 2022;
originally announced May 2022.
-
SHAPE: An Unified Approach to Evaluate the Contribution and Cooperation of Individual Modalities
Authors:
Pengbo Hu,
Xingyu Li,
Yi Zhou
Abstract:
As deep learning advances, there is an ever-growing demand for models capable of synthesizing information from multi-modal resources to address the complex tasks raised from real-life applications. Recently, many large multi-modal datasets have been collected, on which researchers actively explore different methods of fusing multi-modal information. However, little attention has been paid to quant…
▽ More
As deep learning advances, there is an ever-growing demand for models capable of synthesizing information from multi-modal resources to address the complex tasks raised from real-life applications. Recently, many large multi-modal datasets have been collected, on which researchers actively explore different methods of fusing multi-modal information. However, little attention has been paid to quantifying the contribution of different modalities within the proposed models. In this paper, we propose the {\bf SH}apley v{\bf A}lue-based {\bf PE}rceptual (SHAPE) scores that measure the marginal contribution of individual modalities and the degree of cooperation across modalities. Using these scores, we systematically evaluate different fusion methods on different multi-modal datasets for different tasks. Our experiments suggest that for some tasks where different modalities are complementary, the multi-modal models still tend to use the dominant modality alone and ignore the cooperation across modalities. On the other hand, models learn to exploit cross-modal cooperation when different modalities are indispensable for the task. In this case, the scores indicate it is better to fuse different modalities at relatively early stages. We hope our scores can help improve the understanding of how the present multi-modal models operate on different modalities and encourage more sophisticated methods of integrating multiple modalities.
△ Less
Submitted 30 April, 2022;
originally announced May 2022.
-
BI-GreenNet: Learning Green's functions by boundary integral network
Authors:
Guochang Lin,
Fukai Chen,
Pipi Hu,
Xiang Chen,
Junqing Chen,
Jun Wang,
Zuoqiang Shi
Abstract:
Green's function plays a significant role in both theoretical analysis and numerical computing of partial differential equations (PDEs). However, in most cases, Green's function is difficult to compute. The troubles arise in the following three folds. Firstly, compared with the original PDE, the dimension of Green's function is doubled, making it impossible to be handled by traditional mesh-based…
▽ More
Green's function plays a significant role in both theoretical analysis and numerical computing of partial differential equations (PDEs). However, in most cases, Green's function is difficult to compute. The troubles arise in the following three folds. Firstly, compared with the original PDE, the dimension of Green's function is doubled, making it impossible to be handled by traditional mesh-based methods. Secondly, Green's function usually contains singularities which increase the difficulty to get a good approximation. Lastly, the computational domain may be very complex or even unbounded. To override these problems, we leverage the fundamental solution, boundary integral method and neural networks to develop a new method for computing Green's function with high accuracy in this paper. We focus on Green's function of Poisson and Helmholtz equations in bounded domains, unbounded domains. We also consider Poisson equation and Helmholtz domains with interfaces. Extensive numerical experiments illustrate the efficiency and the accuracy of our method for solving Green's function. In addition, we also use the Green's function calculated by our method to solve a class of PDE, and also obtain high-precision solutions, which shows the good generalization ability of our method on solving PDEs.
△ Less
Submitted 27 April, 2022;
originally announced April 2022.
-
Neural Operator with Regularity Structure for Modeling Dynamics Driven by SPDEs
Authors:
Peiyan Hu,
Qi Meng,
Bingguang Chen,
Shiqi Gong,
Yue Wang,
Wei Chen,
Rongchan Zhu,
Zhi-Ming Ma,
Tie-Yan Liu
Abstract:
Stochastic partial differential equations (SPDEs) are significant tools for modeling dynamics in many areas including atmospheric sciences and physics. Neural Operators, generations of neural networks with capability of learning maps between infinite-dimensional spaces, are strong tools for solving parametric PDEs. However, they lack the ability to modeling SPDEs which usually have poor regularity…
▽ More
Stochastic partial differential equations (SPDEs) are significant tools for modeling dynamics in many areas including atmospheric sciences and physics. Neural Operators, generations of neural networks with capability of learning maps between infinite-dimensional spaces, are strong tools for solving parametric PDEs. However, they lack the ability to modeling SPDEs which usually have poor regularity due to the driving noise. As the theory of regularity structure has achieved great successes in analyzing SPDEs and provides the concept model feature vectors that well-approximate SPDEs' solutions, we propose the Neural Operator with Regularity Structure (NORS) which incorporates the feature vectors for modeling dynamics driven by SPDEs. We conduct experiments on various of SPDEs including the dynamic Phi41 model and the 2d stochastic Navier-Stokes equation, and the results demonstrate that the NORS is resolution-invariant, efficient, and achieves one order of magnitude lower error with a modest amount of data.
△ Less
Submitted 17 July, 2022; v1 submitted 13 April, 2022;
originally announced April 2022.
-
Defensive Patches for Robust Recognition in the Physical World
Authors:
Jiakai Wang,
Zixin Yin,
Pengfei Hu,
Aishan Liu,
Renshuai Tao,
Haotong Qin,
Xianglong Liu,
Dacheng Tao
Abstract:
To operate in real-world high-stakes environments, deep learning systems have to endure noises that have been continuously thwarting their robustness. Data-end defense, which improves robustness by operations on input data instead of modifying models, has attracted intensive attention due to its feasibility in practice. However, previous data-end defenses show low generalization against diverse no…
▽ More
To operate in real-world high-stakes environments, deep learning systems have to endure noises that have been continuously thwarting their robustness. Data-end defense, which improves robustness by operations on input data instead of modifying models, has attracted intensive attention due to its feasibility in practice. However, previous data-end defenses show low generalization against diverse noises and weak transferability across multiple models. Motivated by the fact that robust recognition depends on both local and global features, we propose a defensive patch generation framework to address these problems by helping models better exploit these features. For the generalization against diverse noises, we inject class-specific identifiable patterns into a confined local patch prior, so that defensive patches could preserve more recognizable features towards specific classes, leading models for better recognition under noises. For the transferability across multiple models, we guide the defensive patches to capture more global feature correlations within a class, so that they could activate model-shared global perceptions and transfer better among models. Our defensive patches show great potentials to improve application robustness in practice by simply sticking them around target objects. Extensive experiments show that we outperform others by large margins (improve 20+\% accuracy for both adversarial and corruption robustness on average in the digital and physical world). Our codes are available at https://github.com/nlsde-safety-team/DefensivePatch
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
Electrostatic focusing of cold and heavy molecules for the ACME electron EDM search
Authors:
Xing Wu,
Peiran Hu,
Zhen Han,
Daniel G. Ang,
Cole Meisenhelder,
Gerald Gabrielse,
John M. Doyle,
David DeMille
Abstract:
The current best upper limit for electron electric dipole moment (EDM), $|d_e|<1.1\times10^{-29}\,$e$\cdot$cm ($90$% confidence), was set by the ACME collaboration in 2018. The ACME experiment uses a spin-precession measurement in a cold beam of ThO molecules to detect $d_e$. An improvement in statistical uncertainty would be possible with more efficient use of molecules from the cryogenic buffer…
▽ More
The current best upper limit for electron electric dipole moment (EDM), $|d_e|<1.1\times10^{-29}\,$e$\cdot$cm ($90$% confidence), was set by the ACME collaboration in 2018. The ACME experiment uses a spin-precession measurement in a cold beam of ThO molecules to detect $d_e$. An improvement in statistical uncertainty would be possible with more efficient use of molecules from the cryogenic buffer gas beam source. Here, we demonstrate electrostatic focusing of the ThO beam with a hexapole lens. This results in a factor of $16$ enhancement in the molecular flux detectable downstream, in a beamline similar to that built for the next generation of ACME. We also demonstrate an upgraded rotational cooling scheme that increases the ground state population by $3.5$ times compared to no cooling, consistent with expectations and a factor of $1.4$ larger than previously in ACME. When combined with other demonstrated improvements, we project over an order of magnitude improvement in statistical sensitivity for the next generation ACME electron EDM search.
△ Less
Submitted 17 October, 2022; v1 submitted 12 April, 2022;
originally announced April 2022.
-
Segmentation Network with Compound Loss Function for Hydatidiform Mole Hydrops Lesion Recognition
Authors:
Chengze Zhu,
Pingge Hu,
Xianxu Zeng,
Xingtong Wang,
Zehua Ji,
Li Shi
Abstract:
Pathological morphology diagnosis is the standard diagnosis method of hydatidiform mole. As a disease with malignant potential, the hydatidiform mole section of hydrops lesions is an important basis for diagnosis. Due to incomplete lesion development, early hydatidiform mole is difficult to distinguish, resulting in a low accuracy of clinical diagnosis. As a remarkable machine learning technology,…
▽ More
Pathological morphology diagnosis is the standard diagnosis method of hydatidiform mole. As a disease with malignant potential, the hydatidiform mole section of hydrops lesions is an important basis for diagnosis. Due to incomplete lesion development, early hydatidiform mole is difficult to distinguish, resulting in a low accuracy of clinical diagnosis. As a remarkable machine learning technology, image semantic segmentation networks have been used in many medical image recognition tasks. We developed a hydatidiform mole hydrops lesion segmentation model based on a novel loss function and training method. The model consists of different networks that segment the section image at the pixel and lesion levels. Our compound loss function assign weights to the segmentation results of the two levels to calculate the loss. We then propose a stagewise training method to combine the advantages of various loss functions at different levels. We evaluate our method on a hydatidiform mole hydrops dataset. Experiments show that the proposed model with our loss function and training method has good recognition performance under different segmentation metrics.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
A Semantic Segmentation Network Based Real-Time Computer-Aided Diagnosis System for Hydatidiform Mole Hydrops Lesion Recognition in Microscopic View
Authors:
Chengze Zhu,
Pingge Hu,
Xianxu Zeng,
Xingtong Wang,
Zehua Ji,
Li Shi
Abstract:
As a disease with malignant potential, hydatidiform mole (HM) is one of the most common gestational trophoblastic diseases. For pathologists, the HM section of hydrops lesions is an important basis for diagnosis. In pathology departments, the diverse microscopic manifestations of HM lesions and the limited view under the microscope mean that physicians with extensive diagnostic experience are requ…
▽ More
As a disease with malignant potential, hydatidiform mole (HM) is one of the most common gestational trophoblastic diseases. For pathologists, the HM section of hydrops lesions is an important basis for diagnosis. In pathology departments, the diverse microscopic manifestations of HM lesions and the limited view under the microscope mean that physicians with extensive diagnostic experience are required to prevent missed diagnosis and misdiagnosis. Feature extraction can significantly improve the accuracy and speed of the diagnostic process. As a remarkable diagnosis assisting technology, computer-aided diagnosis (CAD) has been widely used in clinical practice. We constructed a deep-learning-based CAD system to identify HM hydrops lesions in the microscopic view in real-time. The system consists of three modules; the image mosaic module and edge extension module process the image to improve the outcome of the hydrops lesion recognition module, which adopts a semantic segmentation network, our novel compound loss function, and a stepwise training function in order to achieve the best performance in identifying hydrops lesions. We evaluated our system using an HM hydrops dataset. Experiments show that our system is able to respond in real-time and correctly display the entire microscopic view with accurately labeled HM hydrops lesions.
△ Less
Submitted 11 April, 2022;
originally announced April 2022.
-
Many-to-many Splatting for Efficient Video Frame Interpolation
Authors:
Ping Hu,
Simon Niklaus,
Stan Sclaroff,
Kate Saenko
Abstract:
Motion-based video frame interpolation commonly relies on optical flow to warp pixels from the inputs to the desired interpolation instant. Yet due to the inherent challenges of motion estimation (e.g. occlusions and discontinuities), most state-of-the-art interpolation approaches require subsequent refinement of the warped result to generate satisfying outputs, which drastically decreases the eff…
▽ More
Motion-based video frame interpolation commonly relies on optical flow to warp pixels from the inputs to the desired interpolation instant. Yet due to the inherent challenges of motion estimation (e.g. occlusions and discontinuities), most state-of-the-art interpolation approaches require subsequent refinement of the warped result to generate satisfying outputs, which drastically decreases the efficiency for multi-frame interpolation. In this work, we propose a fully differentiable Many-to-Many (M2M) splatting framework to interpolate frames efficiently. Specifically, given a frame pair, we estimate multiple bidirectional flows to directly forward warp the pixels to the desired time step, and then fuse any overlapping pixels. In doing so, each source pixel renders multiple target pixels and each target pixel can be synthesized from a larger area of visual context. This establishes a many-to-many splatting scheme with robustness to artifacts like holes. Moreover, for each input frame pair, M2M only performs motion estimation once and has a minuscule computational overhead when interpolating an arbitrary number of in-between frames, hence achieving fast multi-frame interpolation. We conducted extensive experiments to analyze M2M, and found that it significantly improves efficiency while maintaining high effectiveness.
△ Less
Submitted 7 April, 2022;
originally announced April 2022.
-
Linguistic-Acoustic Similarity Based Accent Shift for Accent Recognition
Authors:
Qijie Shao,
Jinghao Yan,
Jian Kang,
Pengcheng Guo,
Xian Shi,
Pengfei Hu,
Lei Xie
Abstract:
General accent recognition (AR) models tend to directly extract low-level information from spectrums, which always significantly overfit on speakers or channels. Considering accent can be regarded as a series of shifts relative to native pronunciation, distinguishing accents will be an easier task with accent shift as input. But due to the lack of native utterance as an anchor, estimating the acce…
▽ More
General accent recognition (AR) models tend to directly extract low-level information from spectrums, which always significantly overfit on speakers or channels. Considering accent can be regarded as a series of shifts relative to native pronunciation, distinguishing accents will be an easier task with accent shift as input. But due to the lack of native utterance as an anchor, estimating the accent shift is difficult. In this paper, we propose linguistic-acoustic similarity based accent shift (LASAS) for AR tasks. For an accent speech utterance, after mapping the corresponding text vector to multiple accent-associated spaces as anchors, its accent shift could be estimated by the similarities between the acoustic embedding and those anchors. Then, we concatenate the accent shift with a dimension-reduced text vector to obtain a linguistic-acoustic bimodal representation. Compared with pure acoustic embedding, the bimodal representation is richer and more clear by taking full advantage of both linguistic and acoustic information, which can effectively improve AR performance. Experiments on Accented English Speech Recognition Challenge (AESRC) dataset show that our method achieves 77.42% accuracy on Test set, obtaining a 6.94% relative improvement over a competitive system in the challenge.
△ Less
Submitted 1 July, 2022; v1 submitted 7 April, 2022;
originally announced April 2022.
-
Leveraging Phone Mask Training for Phonetic-Reduction-Robust E2E Uyghur Speech Recognition
Authors:
Guodong Ma,
Pengfei Hu,
Jian Kang,
Shen Huang,
Hao Huang
Abstract:
In Uyghur speech, consonant and vowel reduction are often encountered, especially in spontaneous speech with high speech rate, which will cause a degradation of speech recognition performance. To solve this problem, we propose an effective phone mask training method for Conformer-based Uyghur end-to-end (E2E) speech recognition. The idea is to randomly mask off a certain percentage features of pho…
▽ More
In Uyghur speech, consonant and vowel reduction are often encountered, especially in spontaneous speech with high speech rate, which will cause a degradation of speech recognition performance. To solve this problem, we propose an effective phone mask training method for Conformer-based Uyghur end-to-end (E2E) speech recognition. The idea is to randomly mask off a certain percentage features of phones during model training, which simulates the above verbal phenomena and facilitates E2E model to learn more contextual information. According to experiments, the above issues can be greatly alleviated. In addition, deep investigations are carried out into different units in masking, which shows the effectiveness of our proposed masking unit. We also further study the masking method and optimize filling strategy of phone mask. Finally, compared with Conformer-based E2E baseline without mask training, our model demonstrates about 5.51% relative Word Error Rate (WER) reduction on reading speech and 12.92% on spontaneous speech, respectively. The above approach has also been verified on test-set of open-source data THUYG-20, which shows 20% relative improvements.
△ Less
Submitted 2 April, 2022;
originally announced April 2022.
-
Accounting for iron-related off-target binding effects of 18F-AV1451 PET in the evaluation of cognition and microstructure in APOE-e4+ MCI
Authors:
Jason Langley,
Daniel E. Huddleston,
Ilana J. Bennett,
Xiaoping P. Hu
Abstract:
The pathology of Alzheimer's disease (AD) and mild cognitive impairment (MCI) is characterized by the presence of beta-amyloid extracellular plaques and neurofibrillary tangles containing hyper-phosphorylated tau. Individuals carrying the apolipoprotein E-e4 (APOE-e4) allele are at increased risk of cognitive decline and developing AD pathology. The development of positron emission tomography (PET…
▽ More
The pathology of Alzheimer's disease (AD) and mild cognitive impairment (MCI) is characterized by the presence of beta-amyloid extracellular plaques and neurofibrillary tangles containing hyper-phosphorylated tau. Individuals carrying the apolipoprotein E-e4 (APOE-e4) allele are at increased risk of cognitive decline and developing AD pathology. The development of positron emission tomography (PET) radioligands sensitive to tau neurofibrillary tangles, such as 18F-AV1451, has allowed for visualization and assessment of AD pathology in vivo. The radioligand used in 18F-AV1451 binds with iron in addition to tau neurofibrillary tangles. We employ multimodal neuroimaging analyses, combining iron-sensitive measures from MRI with 18F-AV1451 PET, to examine off-target binding effects in cohorts of 20 APOE-e4 negative, 20 APOE-e4 positive MCI, and 29 control participants. Increased tau pathology, after controlling for tissue susceptibility, was found in the temporal lobe and hippocampus of APOE-e4+ MCI participants as compared to APOE-e4 negative MCI and control participants. Tau pathology in the hippocampus was significantly related to memory, but only in APOE-e4+ participants. Correlations between hippocampal 18F-AV1451 PET uptake and cognitive correlations did not significantly differ when correcting for the influence of iron on 18F-AV1451 PET signal. However, controlling for susceptibility was found to influence correlations between tau-PET uptake and diffusion metrics and the change in this interaction may be due to the influence of iron on diffusivity. Taken together, these results suggest that iron does not need to be accounted for in group comparisons of tau-PET uptake or correlations between cognitive measures and tau-PET SUVR. However, iron should be taken into account in correlations between diffusion measures and tau-PET uptake.
△ Less
Submitted 9 March, 2022;
originally announced March 2022.
-
MFA-Conformer: Multi-scale Feature Aggregation Conformer for Automatic Speaker Verification
Authors:
Yang Zhang,
Zhiqiang Lv,
Haibin Wu,
Shanshan Zhang,
Pengfei Hu,
Zhiyong Wu,
Hung-yi Lee,
Helen Meng
Abstract:
In this paper, we present Multi-scale Feature Aggregation Conformer (MFA-Conformer), an easy-to-implement, simple but effective backbone for automatic speaker verification based on the Convolution-augmented Transformer (Conformer). The architecture of the MFA-Conformer is inspired by recent stateof-the-art models in speech recognition and speaker verification. Firstly, we introduce a convolution s…
▽ More
In this paper, we present Multi-scale Feature Aggregation Conformer (MFA-Conformer), an easy-to-implement, simple but effective backbone for automatic speaker verification based on the Convolution-augmented Transformer (Conformer). The architecture of the MFA-Conformer is inspired by recent stateof-the-art models in speech recognition and speaker verification. Firstly, we introduce a convolution subsampling layer to decrease the computational cost of the model. Secondly, we adopt Conformer blocks which combine Transformers and convolution neural networks (CNNs) to capture global and local features effectively. Finally, the output feature maps from all Conformer blocks are concatenated to aggregate multi-scale representations before final pooling. We evaluate the MFA-Conformer on the widely used benchmarks. The best system obtains 0.64%, 1.29% and 1.63% EER on VoxCeleb1-O, SITW.Dev, and SITW.Eval set, respectively. MFA-Conformer significantly outperforms the popular ECAPA-TDNN systems in both recognition performance and inference speed. Last but not the least, the ablation studies clearly demonstrate that the combination of global and local feature learning can lead to robust and accurate speaker embedding extraction. We have also released the code for future comparison.
△ Less
Submitted 10 November, 2022; v1 submitted 29 March, 2022;
originally announced March 2022.
-
Fluid-particle interaction regimes during the evolution of turbidity currents from a coupled LES/DEM model
Authors:
Jiafeng Xie,
Peng Hu,
Thomas Pähtz,
Zhiguo He,
Niansheng Cheng
Abstract:
In this paper, fluid-particle interactions in lock-exchange turbidity currents (TCs) over a flat bed are investigated using a model combining LES and DEM (Large-Eddy Simulation and Discrete Element Method). The reliability of this model is demonstrated via comparing the numerical solutions with measurements of the front positions, fluid velocity profile, and particle concentration profile of lock-…
▽ More
In this paper, fluid-particle interactions in lock-exchange turbidity currents (TCs) over a flat bed are investigated using a model combining LES and DEM (Large-Eddy Simulation and Discrete Element Method). The reliability of this model is demonstrated via comparing the numerical solutions with measurements of the front positions, fluid velocity profile, and particle concentration profile of lock-exchange TCs. The following physical understandings are obtained. The vorticity field plays an important role for the current evolution by affecting the fluid lift force (i.e., in the direction normal to the fluid-particle slip velocity) acting on the particles. At the very beginning, a longitudinal positive lift force due to strong positive vorticity promotes longitudinal particle transport. Afterwards, the longitudinal lift force decreases and eventually becomes negative, with a magnitude that even exceeds that of the positive longitudinal drag force, because more and more of the settling particles are affected by the negative vorticity near the bottom wall caused by surface friction. Interestingly, in spite of the complex behavior of the fluid-particle interaction forces and their role in TC evolution, only a very small fraction of the initial particle gravitational potential energy is actually transformed into TC kinetic energy (both particle and fluid).
△ Less
Submitted 24 March, 2022;
originally announced March 2022.
-
On Griffiths conjecture
Authors:
Xianjing Dong,
Peichu Hu
Abstract:
By using techniques of holomorphic jets and Jacobian fields, we devise a non-equidistribution theory of holomorphic curves into complex projective varieties intersecting normal crossing divisors. Based on this theory established, we prove the Griffiths conjecture and the Green-Griffiths conjecture in Nevanlinna theory and algebraic geometry.
By using techniques of holomorphic jets and Jacobian fields, we devise a non-equidistribution theory of holomorphic curves into complex projective varieties intersecting normal crossing divisors. Based on this theory established, we prove the Griffiths conjecture and the Green-Griffiths conjecture in Nevanlinna theory and algebraic geometry.
△ Less
Submitted 30 March, 2022; v1 submitted 21 March, 2022;
originally announced March 2022.
-
Optimal Aggregation Strategies for Social Learning over Graphs
Authors:
Ping Hu,
Virginia Bordignon,
Stefan Vlaski,
Ali H. Sayed
Abstract:
Adaptive social learning is a useful tool for studying distributed decision-making problems over graphs. This paper investigates the effect of combination policies on the performance of adaptive social learning strategies. Using large-deviation analysis, it first derives a bound on the steady-state error probability and characterizes the optimal selection for the Perron eigenvectors of the combina…
▽ More
Adaptive social learning is a useful tool for studying distributed decision-making problems over graphs. This paper investigates the effect of combination policies on the performance of adaptive social learning strategies. Using large-deviation analysis, it first derives a bound on the steady-state error probability and characterizes the optimal selection for the Perron eigenvectors of the combination policies. It subsequently studies the effect of the combination policy on the transient behavior of the learning strategy by estimating the adaptation time in the low signal-to-noise ratio regime. In the process, it is discovered that, interestingly, the influence of the combination policy on the transient behavior is insignificant, and thus it is more critical to employ policies that enhance the steady-state performance. The theoretical conclusions are illustrated by means of computer simulations.
△ Less
Submitted 31 May, 2023; v1 submitted 14 March, 2022;
originally announced March 2022.
-
Multi-Scale Adaptive Network for Single Image Denoising
Authors:
Yuanbiao Gou,
Peng Hu,
Jiancheng Lv,
Joey Tianyi Zhou,
Xi Peng
Abstract:
Multi-scale architectures have shown effectiveness in a variety of tasks thanks to appealing cross-scale complementarity. However, existing architectures treat different scale features equally without considering the scale-specific characteristics, \textit{i.e.}, the within-scale characteristics are ignored in the architecture design. In this paper, we reveal this missing piece for multi-scale arc…
▽ More
Multi-scale architectures have shown effectiveness in a variety of tasks thanks to appealing cross-scale complementarity. However, existing architectures treat different scale features equally without considering the scale-specific characteristics, \textit{i.e.}, the within-scale characteristics are ignored in the architecture design. In this paper, we reveal this missing piece for multi-scale architecture design and accordingly propose a novel Multi-Scale Adaptive Network (MSANet) for single image denoising. Specifically, MSANet simultaneously embraces the within-scale characteristics and the cross-scale complementarity thanks to three novel neural blocks, \textit{i.e.}, adaptive feature block (AFeB), adaptive multi-scale block (AMB), and adaptive fusion block (AFuB). In brief, AFeB is designed to adaptively preserve image details and filter noises, which is highly expected for the features with mixed details and noises. AMB could enlarge the receptive field and aggregate the multi-scale information, which meets the need of contextually informative features. AFuB devotes to adaptively sampling and transferring the features from one scale to another scale, which fuses the multi-scale features with varying characteristics from coarse to fine. Extensive experiments on both three real and six synthetic noisy image datasets show the superiority of MSANet compared with 12 methods. The code could be accessed from https://github.com/XLearning-SCU/2022-NeurIPS-MSANet.
△ Less
Submitted 29 October, 2022; v1 submitted 8 March, 2022;
originally announced March 2022.
-
Clique-factors in graphs with sublinear $\ell$-independence number
Authors:
Jie Han,
Ping Hu,
Guanghui Wang,
Donglei Yang
Abstract:
Given a graph $G$ and an integer $\ell\ge 2$, we denote by $α_{\ell}(G)$ the maximum size of a $K_{\ell}$-free subset of vertices in $V(G)$. A recent question of Nenadov and Pehova asks for determining the best possible minimum degree conditions forcing clique-factors in $n$-vertex graphs $G$ with $α_{\ell}(G) = o(n)$, which can be seen as a Ramsey--Turán variant of the celebrated Hajnal--Szemeréd…
▽ More
Given a graph $G$ and an integer $\ell\ge 2$, we denote by $α_{\ell}(G)$ the maximum size of a $K_{\ell}$-free subset of vertices in $V(G)$. A recent question of Nenadov and Pehova asks for determining the best possible minimum degree conditions forcing clique-factors in $n$-vertex graphs $G$ with $α_{\ell}(G) = o(n)$, which can be seen as a Ramsey--Turán variant of the celebrated Hajnal--Szemerédi theorem. In this paper we find the asymptotical sharp minimum degree threshold for $K_r$-factors in $n$-vertex graphs $G$ with $α_\ell(G)=n^{1-o(1)}$ for all $r\ge \ell\ge 2$.
△ Less
Submitted 19 February, 2023; v1 submitted 4 March, 2022;
originally announced March 2022.
-
Towards Benchmarking and Evaluating Deepfake Detection
Authors:
Chenhao Lin,
Jingyi Deng,
Pengbin Hu,
Chao Shen,
Qian Wang,
Qi Li
Abstract:
Deepfake detection automatically recognizes the manipulated medias through the analysis of the difference between manipulated and non-altered videos. It is natural to ask which are the top performers among the existing deepfake detection approaches to identify promising research directions and provide practical guidance. Unfortunately, it's difficult to conduct a sound benchmarking comparison of e…
▽ More
Deepfake detection automatically recognizes the manipulated medias through the analysis of the difference between manipulated and non-altered videos. It is natural to ask which are the top performers among the existing deepfake detection approaches to identify promising research directions and provide practical guidance. Unfortunately, it's difficult to conduct a sound benchmarking comparison of existing detection approaches using the results in the literature because evaluation conditions are inconsistent across studies. Our objective is to establish a comprehensive and consistent benchmark, to develop a repeatable evaluation procedure, and to measure the performance of a range of detection approaches so that the results can be compared soundly. A challenging dataset consisting of the manipulated samples generated by more than 13 different methods has been collected, and 11 popular detection approaches (9 algorithms) from the existing literature have been implemented and evaluated with 6 fair-minded and practical evaluation metrics. Finally, 92 models have been trained and 644 experiments have been performed for the evaluation. The results along with the shared data and evaluation methodology constitute a benchmark for comparing deepfake detection approaches and measuring progress.
△ Less
Submitted 13 March, 2024; v1 submitted 3 March, 2022;
originally announced March 2022.
-
Traveling edge states in massive Dirac equations along slowly varying edges
Authors:
Pipi Hu,
Peng Xie,
Yi Zhu
Abstract:
Topologically protected wave motion has attracted considerable interest due to its novel properties and potential applications in many different fields. In this work, we study edge modes and traveling edge states via the linear Dirac equations with so-called domain wall masses. The unidirectional edge state provides a heuristic approach to more general traveling edge states through the localized b…
▽ More
Topologically protected wave motion has attracted considerable interest due to its novel properties and potential applications in many different fields. In this work, we study edge modes and traveling edge states via the linear Dirac equations with so-called domain wall masses. The unidirectional edge state provides a heuristic approach to more general traveling edge states through the localized behavior along slowly varying edges. We show the leading asymptotic solutions of two typical edge states that follow the circular and curved edges with small curvature by analytic and quantitative arguments.
△ Less
Submitted 12 June, 2022; v1 submitted 28 February, 2022;
originally announced February 2022.
-
Geometry-Aware Planar Embedding of Treelike Structures
Authors:
Ping Hu,
Saeed Boorboor,
Joseph Marino,
Arie E. Kaufman
Abstract:
The growing complexity of spatial and structural information in 3D data makes data inspection and visualization a challenging task. We describe a method to create a planar embedding of 3D treelike structures using their skeleton representations. Our method maintains the original geometry, without overlaps, to the best extent possible, allowing exploration of the topology within a single view. We p…
▽ More
The growing complexity of spatial and structural information in 3D data makes data inspection and visualization a challenging task. We describe a method to create a planar embedding of 3D treelike structures using their skeleton representations. Our method maintains the original geometry, without overlaps, to the best extent possible, allowing exploration of the topology within a single view. We present a novel camera view generation method which maximizes the visible geometric attributes (segment shape and relative placement between segments). Camera views are created for individual segments and are used to determine local bending angles at each node by projecting them to 2D. The final embedding is generated by minimizing an energy function (the weights of which are user adjustable) based on branch length and the 2D angles, while avoiding intersections. The user can also interactively modify segment placement within the 2D embedding, and the overall embedding will update accordingly. A global to local interactive exploration is provided using hierarchical camera views that are created for subtrees within the structure. We evaluate our method both qualitatively and quantitatively and demonstrate our results by constructing planar visualizations of line data (traced neurons) and volume data (CT vascular and bronchial data
△ Less
Submitted 21 February, 2022;
originally announced February 2022.
-
High-redshift cosmography: Application and comparison with different methods
Authors:
J. P. Hu,
F. Y. Wang
Abstract:
Cosmography is used in cosmological data processing in order to constrain the kinematics of the universe in a model-independent way. In this paper, we first investigate the effect of the ultraviolet (UV) and X-ray relation of a quasar on cosmological constraints. By fitting the quasar relation and cosmographic parameters simultaneously, we find that the 4$σ$ deviation from the cosmological constan…
▽ More
Cosmography is used in cosmological data processing in order to constrain the kinematics of the universe in a model-independent way. In this paper, we first investigate the effect of the ultraviolet (UV) and X-ray relation of a quasar on cosmological constraints. By fitting the quasar relation and cosmographic parameters simultaneously, we find that the 4$σ$ deviation from the cosmological constant cold dark matter ($Λ$CDM) model disappears. Next, utilizing the Pantheon sample and 31 long gamma-ray bursts (LGRBs), we make a comparison among the different cosmographic expansions ($z$-redshift, $y$-redshift, $E(y)$, $\log(1+z)$, $\log(1+z)+k_{ij}$, and Pad$\rm \acute{e}$ approximations) with the third-order and fourth-order expansions. The expansion order can significantly affect the results, especially for the $y$-redshift method. Through analysis from the same sample, the lower-order expansion is preferable, except the $y$-redshift and $E(y)$ methods. For the $y$-redshift and $E(y)$ methods, despite adopting the same parameterization of $y=z/(1+z)$, the performance of the latter is better than that of the former. Logarithmic polynomials, $\log(1+z)$ and $\log(1+z) + k_{ij}$, perform significantly better than $z$-redshift, $y$-redshift, and $E(y)$ methods, but worse than Pad$\rm \acute{e}$ approximations. Finally, we comprehensively analyze the results obtained from different samples. We find that the Pad$\rm \acute{e}_{(2,1)}$ method is suitable for both low and high redshift cases. The Pad$\rm \acute{e}_{(2,2)}$ method performs well in a high-redshift situation. For the $y$-redshift and $E(y)$ methods, the only constraint on the first two parameters ($q_{0}$ and $j_{0}$) is reliable.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
Closing the Management Gap for Satellite-Integrated Community Networks: A Hierarchical Approach to Self-Maintenance
Authors:
Peng Hu
Abstract:
Community networks (CNs) have become an important paradigm for providing essential Internet connectivity in unserved and underserved areas across the world. However, an indispensable part for CNs is network management, where responsive and autonomous maintenance is much needed. With the technological advancement in telecommunications networks, a classical satellite-dependent CN is envisioned to be…
▽ More
Community networks (CNs) have become an important paradigm for providing essential Internet connectivity in unserved and underserved areas across the world. However, an indispensable part for CNs is network management, where responsive and autonomous maintenance is much needed. With the technological advancement in telecommunications networks, a classical satellite-dependent CN is envisioned to be transformed into a satellite-integrated CN (SICN), which will embrace significant autonomy, intelligence, and scalability in network management. This article discusses the machine-learning (ML) based hierarchical approach to enabling autonomous self-maintenance for SICNs. The approach is split into the anomaly identification and anomaly mitigation phases, where the related ML methods, data collection means, deployment options, and mitigation schemes are presented. With the case study, we discuss a typical scenario using satellite and fixed connections as backhaul options and show the effectiveness and performance improvements of the proposed approach with recurrent neural network and ensemble methods
△ Less
Submitted 16 February, 2022; v1 submitted 15 February, 2022;
originally announced February 2022.
-
5G Enabled Fault Detection and Diagnostics: How Do We Achieve Efficiency?
Authors:
Peng Hu,
Jinhuan Zhang
Abstract:
The 5th-generation wireless networks (5G) technologies and mobile edge computing (MEC) provide great promises of enabling new capabilities for the industrial Internet of Things. However, the solutions enabled by the 5G ultra-reliable low-latency communication (URLLC) paradigm come with challenges, where URLLC alone does not necessarily guarantee the efficient execution of time-critical fault detec…
▽ More
The 5th-generation wireless networks (5G) technologies and mobile edge computing (MEC) provide great promises of enabling new capabilities for the industrial Internet of Things. However, the solutions enabled by the 5G ultra-reliable low-latency communication (URLLC) paradigm come with challenges, where URLLC alone does not necessarily guarantee the efficient execution of time-critical fault detection and diagnostics (FDD) applications. Based on the Tennessee Eastman Process model, we propose the concept of the communication-edge-computing (CEC) loop and a system model for evaluating the efficiency of FDD applications. We then formulate an optimization problem for achieving the defined CEC efficiency and discuss some typical solutions to the generic CEC-based FDD services, and propose a new uplink-based communication protocol called "ReFlexUp". From the performance analysis and numerical results, the proposed ReFlexUp protocol shows its effectiveness compared to the typical protocols such as Selective Repeat ARQ, HARQ, and "Occupy CoW" in terms of the key metrics such as latency, reliability, and efficiency. These results are further convinced from the mmWave-based simulations in a typical 5G MEC-based implementation.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Iota: A Framework for Analyzing System-Level Security of IoTs
Authors:
Zheng Fang,
Hao Fu,
Tianbo Gu,
Pengfei Hu,
Jinyue Song,
Trent Jaeger,
Prasant Mohapatra
Abstract:
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT applications, mobile apps, and the physical environment. However, existing IoT security analyses only focus on a subset of all the essential components, such as device firmware, and ignore IoT systems' interactive nature, resulting in limited attack detection capabilities. In this work, we propose Iota, a logic progra…
▽ More
Most IoT systems involve IoT devices, communication protocols, remote cloud, IoT applications, mobile apps, and the physical environment. However, existing IoT security analyses only focus on a subset of all the essential components, such as device firmware, and ignore IoT systems' interactive nature, resulting in limited attack detection capabilities. In this work, we propose Iota, a logic programming-based framework to perform system-level security analysis for IoT systems. Iota generates attack graphs for IoT systems, showing all of the system resources that can be compromised and enumerating potential attack traces. In building Iota, we design novel techniques to scan IoT systems for individual vulnerabilities and further create generic exploit models for IoT vulnerabilities. We also identify and model physical dependencies between different devices as they are unique to IoT systems and are employed by adversaries to launch complicated attacks. In addition, we utilize NLP techniques to extract IoT app semantics based on app descriptions. To evaluate vulnerabilities' system-wide impact, we propose two metrics based on the attack graph, which provide guidance on fortifying IoT systems. Evaluation on 127 IoT CVEs (Common Vulnerabilities and Exposures) shows that Iota's exploit modeling module achieves over 80% accuracy in predicting vulnerabilities' preconditions and effects. We apply Iota to 37 synthetic smart home IoT systems based on real-world IoT apps and devices. Experimental results show that our framework is effective and highly efficient. Among 27 shortest attack traces revealed by the attack graphs, 62.8% are not anticipated by the system administrator. It only takes 1.2 seconds to generate and analyze the attack graph for an IoT system consisting of 50 devices.
△ Less
Submitted 5 February, 2022;
originally announced February 2022.
-
Splatting-based Synthesis for Video Frame Interpolation
Authors:
Simon Niklaus,
Ping Hu,
Jiawen Chen
Abstract:
Frame interpolation is an essential video processing technique that adjusts the temporal resolution of an image sequence. While deep learning has brought great improvements to the area of video frame interpolation, techniques that make use of neural networks can typically not easily be deployed in practical applications like a video editor since they are either computationally too demanding or fai…
▽ More
Frame interpolation is an essential video processing technique that adjusts the temporal resolution of an image sequence. While deep learning has brought great improvements to the area of video frame interpolation, techniques that make use of neural networks can typically not easily be deployed in practical applications like a video editor since they are either computationally too demanding or fail at high resolutions. In contrast, we propose a deep learning approach that solely relies on splatting to synthesize interpolated frames. This splatting-based synthesis for video frame interpolation is not only much faster than similar approaches, especially for multi-frame interpolation, but can also yield new state-of-the-art results at high resolutions.
△ Less
Submitted 25 October, 2022; v1 submitted 24 January, 2022;
originally announced January 2022.
-
MeTeoR: Practical Reasoning in Datalog with Metric Temporal Operators
Authors:
Dingmin Wang,
Pan Hu,
Przemysław Andrzej Wałęga,
Bernardo Cuenca Grau
Abstract:
DatalogMTL is an extension of Datalog with operators from metric temporal logic which has received significant attention in recent years. It is a highly expressive knowledge representation language that is well-suited for applications in temporal ontology-based query answering and stream processing. Reasoning in DatalogMTL is, however, of high computational complexity, making implementation challe…
▽ More
DatalogMTL is an extension of Datalog with operators from metric temporal logic which has received significant attention in recent years. It is a highly expressive knowledge representation language that is well-suited for applications in temporal ontology-based query answering and stream processing. Reasoning in DatalogMTL is, however, of high computational complexity, making implementation challenging and hindering its adoption in applications. In this paper, we present a novel approach for practical reasoning in DatalogMTL which combines materialisation (a.k.a. forward chaining) with automata-based techniques. We have implemented this approach in a reasoner called MeTeoR and evaluated its performance using a temporal extension of the Lehigh University Benchmark and a benchmark based on real-world meteorological data. Our experiments show that MeTeoR is a scalable system which enables reasoning over complex temporal rules and datasets involving tens of millions of temporal facts.
△ Less
Submitted 12 January, 2022;
originally announced January 2022.
-
Resonant tunneling in disordered borophene nanoribbons with line defects
Authors:
Pei-Jia Hu,
Si-Xian Wang,
Xiao-Feng Chen,
Zeng-Ren Liang,
Tie-Feng Fang,
Ai-Min Guo,
Hui Xu,
Qing-Feng Sun
Abstract:
Very recently, borophene has been attracting extensive and ongoing interest as the new wonder material with structural polymorphism and superior attributes, showing that the structural imperfection of line defects (LDs) occurs widely at the interface between $ν_{1/5}$ ($χ_3$) and $ν_{1/6}$ ($β_{12}$) boron sheets. Motivated by these experiments, here we present a theoretical study of electron tran…
▽ More
Very recently, borophene has been attracting extensive and ongoing interest as the new wonder material with structural polymorphism and superior attributes, showing that the structural imperfection of line defects (LDs) occurs widely at the interface between $ν_{1/5}$ ($χ_3$) and $ν_{1/6}$ ($β_{12}$) boron sheets. Motivated by these experiments, here we present a theoretical study of electron transport through two-terminal disordered borophene nanoribbons (BNRs) with random distribution of LDs. Our results indicate that LDs could strongly affect the electron transport properties of BNRs. In the absence of LDs, both $ν_{1/5}$ and $ν_{1/6}$ BNRs exhibit metallic behavior, in agreement with experiments. While in the presence of LDs, the overall electron transport ability is dramatically decreased, but some resonant peaks of conductance quantum can be found in the transmission spectrum of any disordered BNR with arbitrary arrangement of LDs. These disordered BNRs exhibit metal-insulator transition by varying nanoribbon width with tunable transmission gap in the insulating regime. Furthermore, the bond currents present fringe patterns and two evolution phenomena of resonant peaks are revealed for disordered BNRs with different widths. These results may help for understanding structure-property relationships and designing LD-based nanodevices.
△ Less
Submitted 9 January, 2022;
originally announced January 2022.
-
Effective Action, Spectrum and First Law of Wedge Holography
Authors:
Peng-Ju Hu,
Rong-Xin Miao
Abstract:
In this paper, we study the effective action, the mass spectrum and the first law of entanglement entropy for a novel doubly holographic model called wedge holography. We work out the effective action of quantum gravity on the branes. In the perturbative formulation, it is given by an infinite sum of Pauli-Fierz actions. In the non-perturbative formulation, the effective action is composed of a hi…
▽ More
In this paper, we study the effective action, the mass spectrum and the first law of entanglement entropy for a novel doubly holographic model called wedge holography. We work out the effective action of quantum gravity on the branes. In the perturbative formulation, it is given by an infinite sum of Pauli-Fierz actions. In the non-perturbative formulation, the effective action is composed of a higher derivative gravity and a matter action. Usually, a higher derivative gravity can be renormalizable but suffers the ghost problem. For our case, since the effective theory on the brane is equivalent to Einstein gravity in the bulk, it must be ghost-free. We notice that the matter action plays an important role in eliminating the ghost. We also provide evidences that the higher derivative gravity on the brane is equivalent to a ghost-free multi-gravity. Besides, we prove that the effective action yields the correct Weyl anomaly. Interestingly, although the effective action on the brane is an infinite tower of higher derivative gravity, the holographic Weyl anomaly is exactly the same as that of Einstein gravity. We also analyze the mass spectrum of wedge holography. Remarkably, there is always a massless mode of gravitons on the end-of-the-world branes in wedge holography. This happens because one imposes Neumann boundary condition on both branes. On the other hand, the massless mode disappears if one imposes Dirichlet boundary condition on one of the branes as in brane world theory and AdS/BCFT. Finally, we verify the first law of entanglement entropy for wedge holography. Interestingly, the massive fluctuations are irrelevant to the first order perturbation of the holographic entanglement entropy. Thus, in many aspects, the effective theory on the brane behaves like massless Einstein gravity.
△ Less
Submitted 8 March, 2022; v1 submitted 6 January, 2022;
originally announced January 2022.
-
Semantics-Recovering Decompilation through Neural Machine Translation
Authors:
Ruigang Liang,
Ying Cao,
Peiwei Hu,
Jinwen He,
Kai Chen
Abstract:
Decompilation transforms low-level program languages (PL) (e.g., binary code) into high-level PLs (e.g., C/C++). It has been widely used when analysts perform security analysis on software (systems) whose source code is unavailable, such as vulnerability search and malware analysis. However, current decompilation tools usually need lots of experts' efforts, even for years, to generate the rules fo…
▽ More
Decompilation transforms low-level program languages (PL) (e.g., binary code) into high-level PLs (e.g., C/C++). It has been widely used when analysts perform security analysis on software (systems) whose source code is unavailable, such as vulnerability search and malware analysis. However, current decompilation tools usually need lots of experts' efforts, even for years, to generate the rules for decompilation, which also requires long-term maintenance as the syntax of high-level PL or low-level PL changes. Also, an ideal decompiler should concisely generate high-level PL with similar functionality to the source low-level PL and semantic information (e.g., meaningful variable names), just like human-written code. Unfortunately, existing manually-defined rule-based decompilation techniques only functionally restore the low-level PL to a similar high-level PL and are still powerless to recover semantic information. In this paper, we propose a novel neural decompilation approach to translate low-level PL into accurate and user-friendly high-level PL, effectively improving its readability and understandability. Furthermore, we implement the proposed approaches called SEAM. Evaluations on four real-world applications show that SEAM has an average accuracy of 94.41%, which is much better than prior neural machine translation (NMT) models. Finally, we evaluate the effectiveness of semantic information recovery through a questionnaire survey, and the average accuracy is 92.64%, which is comparable or superior to the state-of-the-art compilers.
△ Less
Submitted 22 December, 2021;
originally announced December 2021.
-
SoK: Privacy-preserving Deep Learning with Homomorphic Encryption
Authors:
Robert Podschwadt,
Daniel Takabi,
Peizhao Hu
Abstract:
Outsourced computation for neural networks allows users access to state of the art models without needing to invest in specialized hardware and know-how. The problem is that the users lose control over potentially privacy sensitive data. With homomorphic encryption (HE) computation can be performed on encrypted data without revealing its content. In this systematization of knowledge, we take an in…
▽ More
Outsourced computation for neural networks allows users access to state of the art models without needing to invest in specialized hardware and know-how. The problem is that the users lose control over potentially privacy sensitive data. With homomorphic encryption (HE) computation can be performed on encrypted data without revealing its content. In this systematization of knowledge, we take an in-depth look at approaches that combine neural networks with HE for privacy preservation. We categorize the changes to neural network models and architectures to make them computable over HE and how these changes impact performance. We find numerous challenges to HE based privacy-preserving deep learning such as computational overhead, usability, and limitations posed by the encryption schemes.
△ Less
Submitted 1 January, 2022; v1 submitted 23 December, 2021;
originally announced December 2021.
-
Optofluidic ptychography on a chip
Authors:
Pengming Song,
Chengfei Guo,
Shaowei Jiang,
Tianbo Wang,
Patrick Hu,
Derek Hu,
Zibang Zhang,
Bin Feng,
Guoan Zheng
Abstract:
We report the implementation of a fully on-chip, lensless microscopy technique termed optofluidic ptychography. This imaging modality complements the miniaturization provided by microfluidics and allows the integration of ptychographic microscopy into various lab-on-a-chip devices. In our prototype, we place a microfluidic channel on the top surface of a coverslip and coat the bottom surface with…
▽ More
We report the implementation of a fully on-chip, lensless microscopy technique termed optofluidic ptychography. This imaging modality complements the miniaturization provided by microfluidics and allows the integration of ptychographic microscopy into various lab-on-a-chip devices. In our prototype, we place a microfluidic channel on the top surface of a coverslip and coat the bottom surface with a scattering layer. The channel and the coated coverslip substrate are then placed on top of an image sensor for diffraction data acquisition. Similar to the operation of flow cytometer, the device utilizes microfluidic flow to deliver specimens across the channel. The diffracted light from the flowing objects is modulated by the scattering layer and recorded by the image sensor for ptychographic reconstruction, where high-resolution quantitative complex images are recovered from the diffraction measurements. By using an image sensor with a 1.85-micron pixel size, our device can resolve the 550 nm linewidth on the resolution target. We validate the device by imaging different types of biospecimens, including C. elegans, yeast cells, paramecium, and closterium sp. We also demonstrate high-resolution ptychographic reconstruction at a video framerate of 30 frames per second. The reported technique can address a wide range of biomedical needs and engenders new ptychographic imaging innovations in a flow cytometer configuration.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
Ptychographic sensor for large-scale lensless microbial monitoring with high spatiotemporal resolution
Authors:
Shaowei Jiang,
Chengfei Guo,
Zichao Bian,
Ruihai Wang,
Jiakai Zhu,
Pengming Song,
Patrick Hu,
Derek Hu,
Zibang Zhang,
Kazunori Hoshino,
Bin Feng,
Guoan Zheng
Abstract:
Traditional microbial detection methods often rely on the overall property of microbial cultures and cannot resolve individual growth event at high spatiotemporal resolution. As a result, they require bacteria to grow to confluence and then interpret the results. Here, we demonstrate the application of an integrated ptychographic sensor for lensless cytometric analysis of microbial cultures over a…
▽ More
Traditional microbial detection methods often rely on the overall property of microbial cultures and cannot resolve individual growth event at high spatiotemporal resolution. As a result, they require bacteria to grow to confluence and then interpret the results. Here, we demonstrate the application of an integrated ptychographic sensor for lensless cytometric analysis of microbial cultures over a large scale and with high spatiotemporal resolution. The reported device can be placed within a regular incubator or used as a standalone incubating unit for long-term microbial monitoring. For longitudinal study where massive data are acquired at sequential time points, we report a new temporal-similarity constraint to increase the temporal resolution of ptychographic reconstruction by 7-fold. With this strategy, the reported device achieves a centimeter-scale field of view, a half-pitch spatial resolution of 488 nm, and a temporal resolution of 15-second intervals. For the first time, we report the direct observation of bacterial growth in a 15-second interval by tracking the phase wraps of the recovered images, with high phase sensitivity like that in interferometric measurements. We also characterize cell growth via longitudinal dry mass measurement and perform rapid bacterial detection at low concentrations. For drug-screening application, we demonstrate proof-of-concept antibiotic susceptibility testing and perform single-cell analysis of antibiotic-induced filamentation. The combination of high phase sensitivity, high spatiotemporal resolution, and large field of view is unique among existing microscopy techniques. As a quantitative and miniaturized platform, it can improve studies with microorganisms and other biospecimens at resource-limited settings.
△ Less
Submitted 15 December, 2021;
originally announced December 2021.
-
Thermodynamics to infer the astrophysics of binary black hole mergers
Authors:
Patrick Hu,
Karan Jani,
Kelly Holley-Bockelmann,
Gregorio Carullo
Abstract:
We introduce the Merger Entropy Index ($\mathcal{I}_\mathrm{BBH}$), a new parameter to measure the efficiency of entropy transfer for any generic binary black hole merger in General Relativity. We find that $\mathcal{I}_\mathrm{BBH}$ is bounded between an asymptotic maximum and minimum. For the observed population of mergers detected by LIGO and Virgo, we find that $\mathcal{I}_\mathrm{BBH}$ is…
▽ More
We introduce the Merger Entropy Index ($\mathcal{I}_\mathrm{BBH}$), a new parameter to measure the efficiency of entropy transfer for any generic binary black hole merger in General Relativity. We find that $\mathcal{I}_\mathrm{BBH}$ is bounded between an asymptotic maximum and minimum. For the observed population of mergers detected by LIGO and Virgo, we find that $\mathcal{I}_\mathrm{BBH}$ is $\lesssim30\%$ of its theoretical maximum. By imposing the thermodynamical consistency between the pre- and post-merger states through $\mathcal{I}_\mathrm{BBH}$, we showcase BRAHMA -- a novel framework to infer the properties and astrophysical implications of gravitational-wave detections. For GW190521 -- the heaviest confirmed binary black hole merger observed so far -- our framework rules out high mass-ratio, negative effective inspiral spin, and electromagnetic counterpart claims. Furthermore, our analysis provides an independent confirmation that GW190521 belongs to a separate population.
△ Less
Submitted 13 December, 2021;
originally announced December 2021.
-
PM-MMUT: Boosted Phone-Mask Data Augmentation using Multi-Modeling Unit Training for Phonetic-Reduction-Robust E2E Speech Recognition
Authors:
Guodong Ma,
Pengfei Hu,
Nurmemet Yolwas,
Shen Huang,
Hao Huang
Abstract:
Consonant and vowel reduction are often encountered in speech, which might cause performance degradation in automatic speech recognition (ASR). Our recently proposed learning strategy based on masking, Phone Masking Training (PMT), alleviates the impact of such phenomenon in Uyghur ASR. Although PMT achieves remarkably improvements, there still exists room for further gains due to the granularity…
▽ More
Consonant and vowel reduction are often encountered in speech, which might cause performance degradation in automatic speech recognition (ASR). Our recently proposed learning strategy based on masking, Phone Masking Training (PMT), alleviates the impact of such phenomenon in Uyghur ASR. Although PMT achieves remarkably improvements, there still exists room for further gains due to the granularity mismatch between the masking unit of PMT (phoneme) and the modeling unit (word-piece). To boost the performance of PMT, we propose multi-modeling unit training (MMUT) architecture fusion with PMT (PM-MMUT). The idea of MMUT framework is to split the Encoder into two parts including acoustic feature sequences to phoneme-level representation (AF-to-PLR) and phoneme-level representation to word-piece-level representation (PLR-to-WPLR). It allows AF-to-PLR to be optimized by an intermediate phoneme-based CTC loss to learn the rich phoneme-level context information brought by PMT. Experimental results on Uyghur ASR show that the proposed approaches outperform obviously the pure PMT. We also conduct experiments on the 960-hour Librispeech benchmark using ESPnet1, which achieves about 10% relative WER reduction on all the test set without LM fusion comparing with the latest official ESPnet1 pre-trained model.
△ Less
Submitted 2 July, 2022; v1 submitted 13 December, 2021;
originally announced December 2021.
-
Learning to Detect Every Thing in an Open World
Authors:
Kuniaki Saito,
Ping Hu,
Trevor Darrell,
Kate Saenko
Abstract:
Many open-world applications require the detection of novel objects, yet state-of-the-art object detection and instance segmentation networks do not excel at this task. The key issue lies in their assumption that regions without any annotations should be suppressed as negatives, which teaches the model to treat the unannotated objects as background. To address this issue, we propose a simple yet s…
▽ More
Many open-world applications require the detection of novel objects, yet state-of-the-art object detection and instance segmentation networks do not excel at this task. The key issue lies in their assumption that regions without any annotations should be suppressed as negatives, which teaches the model to treat the unannotated objects as background. To address this issue, we propose a simple yet surprisingly powerful data augmentation and training scheme we call Learning to Detect Every Thing (LDET). To avoid suppressing hidden objects, background objects that are visible but unlabeled, we paste annotated objects on a background image sampled from a small region of the original image. Since training solely on such synthetically-augmented images suffers from domain shift, we decouple the training into two parts: 1) training the region classification and regression head on augmented images, and 2)~training the mask heads on original images. In this way, a model does not learn to classify hidden objects as background while generalizing well to real images. LDET leads to significant improvements on many datasets in the open-world instance segmentation task, outperforming baselines on cross-category generalization on COCO, as well as cross-dataset evaluation on UVO and Cityscapes.
△ Less
Submitted 12 April, 2022; v1 submitted 2 December, 2021;
originally announced December 2021.
-
Triples-to-Text Generation with Reinforcement Learning Based Graph-augmented Neural Networks
Authors:
Hanning Gao,
Lingfei Wu,
Hongyun Zhang,
Zhihua Wei,
Po Hu,
Fangli Xu,
Bo Long
Abstract:
Considering a collection of RDF triples, the RDF-to-text generation task aims to generate a text description. Most previous methods solve this task using a sequence-to-sequence model or using a graph-based model to encode RDF triples and to generate a text sequence. Nevertheless, these approaches fail to clearly model the local and global structural information between and within RDF triples. More…
▽ More
Considering a collection of RDF triples, the RDF-to-text generation task aims to generate a text description. Most previous methods solve this task using a sequence-to-sequence model or using a graph-based model to encode RDF triples and to generate a text sequence. Nevertheless, these approaches fail to clearly model the local and global structural information between and within RDF triples. Moreover, the previous methods also face the non-negligible problem of low faithfulness of the generated text, which seriously affects the overall performance of these models. To solve these problems, we propose a model combining two new graph-augmented structural neural encoders to jointly learn both local and global structural information in the input RDF triples. To further improve text faithfulness, we innovatively introduce a reinforcement learning (RL) reward based on information extraction (IE). We first extract triples from the generated text using a pretrained IE model and regard the correct number of the extracted triples as the additional RL reward. Experimental results on two benchmark datasets demonstrate that our proposed model outperforms the state-of-the-art baselines, and the additional reinforcement learning reward does help to improve the faithfulness of the generated text.
△ Less
Submitted 23 March, 2022; v1 submitted 20 November, 2021;
originally announced November 2021.
-
Graph-augmented Learning to Rank for Querying Large-scale Knowledge Graph
Authors:
Hanning Gao,
Lingfei Wu,
Po Hu,
Zhihua Wei,
Fangli Xu,
Bo Long
Abstract:
Knowledge graph question answering (KGQA) based on information retrieval aims to answer a question by retrieving answer from a large-scale knowledge graph. Most existing methods first roughly retrieve the knowledge subgraphs (KSG) that may contain candidate answer, and then search for the exact answer in the KSG. However, the KSG may contain thousands of candidate nodes since the knowledge graph i…
▽ More
Knowledge graph question answering (KGQA) based on information retrieval aims to answer a question by retrieving answer from a large-scale knowledge graph. Most existing methods first roughly retrieve the knowledge subgraphs (KSG) that may contain candidate answer, and then search for the exact answer in the KSG. However, the KSG may contain thousands of candidate nodes since the knowledge graph involved in querying is often of large scale, thus decreasing the performance of answer selection. To tackle this problem, we first propose to partition the retrieved KSG to several smaller sub-KSGs via a new subgraph partition algorithm and then present a graph-augmented learning to rank model to select the top-ranked sub-KSGs from them. Our proposed model combines a novel subgraph matching networks to capture global interactions in both question and subgraphs, and an Enhanced Bilateral Multi-Perspective Matching model is proposed to capture local interactions. Finally, we apply an answer selection model on the full KSG and the top-ranked sub-KSGs respectively to validate the effectiveness of our proposed graph-augmented learning to rank method. The experimental results on multiple benchmark datasets have demonstrated the effectiveness of our approach.
△ Less
Submitted 4 October, 2022; v1 submitted 20 November, 2021;
originally announced November 2021.
-
VRM-Phase I VKW system description of long-short video customizable keyword wakeup challenge
Authors:
Yougen Yuan,
Zhiqiang Lv,
Shen Huang,
Pengfei Hu
Abstract:
Keyword wakeup technology has always been a research hotspot in speech processing, but many related works were done on different datasets. We organized a Chinese long-short video keyword wakeup challenge (Video Keyword Wakeup Challenge, VKW) for testing the ability of each participating team to build a keyword wakeup system under the public dataset. All submitted systems not only need to support t…
▽ More
Keyword wakeup technology has always been a research hotspot in speech processing, but many related works were done on different datasets. We organized a Chinese long-short video keyword wakeup challenge (Video Keyword Wakeup Challenge, VKW) for testing the ability of each participating team to build a keyword wakeup system under the public dataset. All submitted systems not only need to support the setting of multiple different keywords, but also need to support the wakeup of any costumed keyword.This paper mainly describes the basic situation of the VKW challenge and the experimental results of some participating teams.
△ Less
Submitted 18 October, 2021;
originally announced October 2021.
-
The Second Main Theorem for spherically symmetric Kähler manifolds
Authors:
Xianjing Dong,
Peichu Hu
Abstract:
We investigate the value distribution of holomorphic maps defined on one class of Kähler manifolds. With the very natural settings, we establish a Second Main Theorem which is of the similar form as ones of the classical Second Main Theorem for complex Euclidean spaces and complex unit balls.
We investigate the value distribution of holomorphic maps defined on one class of Kähler manifolds. With the very natural settings, we establish a Second Main Theorem which is of the similar form as ones of the classical Second Main Theorem for complex Euclidean spaces and complex unit balls.
△ Less
Submitted 18 May, 2022; v1 submitted 26 October, 2021;
originally announced October 2021.
-
A density-wave-like transition in the polycrystalline V3Sb2 sample with bilayer kagome lattice
Authors:
N. N. Wang,
Y. H. Gu,
M. A. McGuire,
J. Q. Yan,
L. F. Shi,
Q. Cui,
K. Y. Chen,
Y. X. Wang,
H. Zhang,
H. X. Yang,
X. L. Dong,
K. Jiang,
J. P. Hu,
B. S. Wang,
J. P. Sun,
J. -G. Cheng
Abstract:
Recently, transition-metal-based kagome metals have aroused much research interest as a novel platform to explore exotic topological quantum phenomena. Here we report on the synthesis, structure, and physical properties of a bilayer kagome lattice compound V3Sb2. The polycrystalline V3Sb2 samples were synthesized by conventional solid-state-reaction method in a sealed quartz tube at temperatures b…
▽ More
Recently, transition-metal-based kagome metals have aroused much research interest as a novel platform to explore exotic topological quantum phenomena. Here we report on the synthesis, structure, and physical properties of a bilayer kagome lattice compound V3Sb2. The polycrystalline V3Sb2 samples were synthesized by conventional solid-state-reaction method in a sealed quartz tube at temperatures below 850 Celsius degree. Measurements of magnetic susceptibility and resistivity revealed consistently a density-wave-like transition at Tdw ~ 160 K with a large thermal hysteresis, even though some sample-dependent behaviors are observed presumably due to the different preparation conditions. Upon cooling through Tdw, no strong anomaly in lattice parameters and no indication of symmetry lowering were detected in powder x-ray diffraction measurements. This transition can be suppressed completely by applying hydrostatic pressures of about 1.8 GPa, around which no sign of superconductivity is observed down to 1.5 K. Specific-heat measurements reveal a relatively large Sommerfeld coefficient γ = 18.5 mJ/mol-K2, confirming the metallic ground state with moderate electronic correlations. Density functional theory calculations indicate that V3Sb2 shows a non-trivial topological crystalline property. Thus, our study makes V3Sb2 a new candidate of metallic kagome compound to study the interplay between density-wave-order, nontrivial band topology, and possible superconductivity.
△ Less
Submitted 18 December, 2021; v1 submitted 26 October, 2021;
originally announced October 2021.
-
KaraTuner: Towards end to end natural pitch correction for singing voice in karaoke
Authors:
Xiaobin Zhuang,
Huiran Yu,
Weifeng Zhao,
Tao Jiang,
Peng Hu
Abstract:
An automatic pitch correction system typically includes several stages, such as pitch extraction, deviation estimation, pitch shift processing, and cross-fade smoothing. However, designing these components with strategies often requires domain expertise and they are likely to fail on corner cases. In this paper, we present KaraTuner, an end-to-end neural architecture that predicts pitch curve and…
▽ More
An automatic pitch correction system typically includes several stages, such as pitch extraction, deviation estimation, pitch shift processing, and cross-fade smoothing. However, designing these components with strategies often requires domain expertise and they are likely to fail on corner cases. In this paper, we present KaraTuner, an end-to-end neural architecture that predicts pitch curve and resynthesizes the singing voice directly from the tuned pitch and vocal spectrum extracted from the original recordings. Several vital technical points have been introduced in KaraTuner to ensure pitch accuracy, pitch naturalness, timbre consistency, and sound quality. A feed-forward Transformer is employed in the pitch predictor to capture longterm dependencies in the vocal spectrum and musical note. We also develop a pitch-controllable vocoder based on a novel source-filter block and the Fre-GAN architecture. KaraTuner obtains a higher preference than the rule-based pitch correction approach through A/B tests, and perceptual experiments show that the proposed vocoder achieves significant advantages in timbre consistency and sound quality compared with the parametric WORLD vocoder, phase vocoder and CLPC vocoder.
△ Less
Submitted 26 June, 2022; v1 submitted 18 October, 2021;
originally announced October 2021.
-
High-throughput lensless whole slide imaging via continuous height-varying modulation of tilted sensor
Authors:
Shaowei Jiang,
Chengfei Guo,
Patrick Hu,
Derek Hu,
Pengming Song,
Tianbo Wang,
Zichao Bian,
Zibang Zhang,
Guoan Zheng
Abstract:
We report a new lensless microscopy configuration by integrating the concepts of transverse translational ptychography and defocus multi-height phase retrieval. In this approach, we place a tilted image sensor under the specimen for linearly-increasing phase modulation along one lateral direction. Similar to the operation of ptychography, we laterally translate the specimen and acquire the diffrac…
▽ More
We report a new lensless microscopy configuration by integrating the concepts of transverse translational ptychography and defocus multi-height phase retrieval. In this approach, we place a tilted image sensor under the specimen for linearly-increasing phase modulation along one lateral direction. Similar to the operation of ptychography, we laterally translate the specimen and acquire the diffraction images for reconstruction. Since the axial distance between the specimen and the sensor varies at different lateral positions, laterally translating the specimen effectively introduces defocus multi-height measurements while eliminating axial scanning. Lateral translation further introduces sub-pixel shift for pixel super-resolution imaging and naturally expands the field of view for rapid whole slide imaging. We show that the equivalent height variation can be precisely estimated from the lateral shift of the specimen, thereby addressing the challenge of precise axial positioning in conventional multi-height phase retrieval. Using a sensor with a 1.67-micron pixel size, our low-cost and field-portable prototype can resolve 690-nm linewidth on the resolution target. We show that a whole slide image of a blood smear with a 120-mm^2 field of view can be acquired in 18 seconds. We also demonstrate accurate automatic white blood cell counting from the recovered image. The reported approach may provide a turnkey solution for addressing point-of-care- and telemedicine-related challenges.
△ Less
Submitted 28 September, 2021;
originally announced October 2021.
-
BINet: Learning to Solve Partial Differential Equations with Boundary Integral Networks
Authors:
Guochang Lin,
Pipi Hu,
Fukai Chen,
Xiang Chen,
Junqing Chen,
Jun Wang,
Zuoqiang Shi
Abstract:
We propose a method combining boundary integral equations and neural networks (BINet) to solve partial differential equations (PDEs) in both bounded and unbounded domains. Unlike existing solutions that directly operate over original PDEs, BINet learns to solve, as a proxy, associated boundary integral equations using neural networks. The benefits are three-fold. Firstly, only the boundary conditi…
▽ More
We propose a method combining boundary integral equations and neural networks (BINet) to solve partial differential equations (PDEs) in both bounded and unbounded domains. Unlike existing solutions that directly operate over original PDEs, BINet learns to solve, as a proxy, associated boundary integral equations using neural networks. The benefits are three-fold. Firstly, only the boundary conditions need to be fitted since the PDE can be automatically satisfied with single or double layer representations according to the potential theory. Secondly, the dimension of the boundary integral equations is typically smaller, and as such, the sample complexity can be reduced significantly. Lastly, in the proposed method, all differential operators of the original PDEs have been removed, hence the numerical efficiency and stability are improved. Adopting neural tangent kernel (NTK) techniques, we provide proof of the convergence of BINets in the limit that the width of the neural network goes to infinity. Extensive numerical experiments show that, without calculating high-order derivatives, BINet is much easier to train and usually gives more accurate solutions, especially in the cases that the boundary conditions are not smooth enough. Further, BINet outperforms strong baselines for both one single PDE and parameterized PDEs in the bounded and unbounded domains.
△ Less
Submitted 1 October, 2021;
originally announced October 2021.
-
Membership Inference Attacks Against Recommender Systems
Authors:
Minxing Zhang,
Zhaochun Ren,
Zihan Wang,
Pengjie Ren,
Zhumin Chen,
Pengfei Hu,
Yang Zhang
Abstract:
Recently, recommender systems have achieved promising performances and become one of the most widely used web applications. However, recommender systems are often trained on highly sensitive user data, thus potential data leakage from recommender systems may lead to severe privacy problems.
In this paper, we make the first attempt on quantifying the privacy leakage of recommender systems through…
▽ More
Recently, recommender systems have achieved promising performances and become one of the most widely used web applications. However, recommender systems are often trained on highly sensitive user data, thus potential data leakage from recommender systems may lead to severe privacy problems.
In this paper, we make the first attempt on quantifying the privacy leakage of recommender systems through the lens of membership inference. In contrast with traditional membership inference against machine learning classifiers, our attack faces two main differences. First, our attack is on the user-level but not on the data sample-level. Second, the adversary can only observe the ordered recommended items from a recommender system instead of prediction results in the form of posterior probabilities. To address the above challenges, we propose a novel method by representing users from relevant items. Moreover, a shadow recommender is established to derive the labeled training data for training the attack model. Extensive experimental results show that our attack framework achieves a strong performance. In addition, we design a defense mechanism to effectively mitigate the membership inference threat of recommender systems.
△ Less
Submitted 16 September, 2021;
originally announced September 2021.
-
AdaK-NER: An Adaptive Top-K Approach for Named Entity Recognition with Incomplete Annotations
Authors:
Hongtao Ruan,
Liying Zheng,
Peixian Hu
Abstract:
State-of-the-art Named Entity Recognition(NER) models rely heavily on large amountsof fully annotated training data. However, ac-cessible data are often incompletely annotatedsince the annotators usually lack comprehen-sive knowledge in the target domain. Normallythe unannotated tokens are regarded as non-entities by default, while we underline thatthese tokens could either be non-entities orpart…
▽ More
State-of-the-art Named Entity Recognition(NER) models rely heavily on large amountsof fully annotated training data. However, ac-cessible data are often incompletely annotatedsince the annotators usually lack comprehen-sive knowledge in the target domain. Normallythe unannotated tokens are regarded as non-entities by default, while we underline thatthese tokens could either be non-entities orpart of any entity. Here, we study NER mod-eling with incomplete annotated data whereonly a fraction of the named entities are la-beled, and the unlabeled tokens are equiva-lently multi-labeled by every possible label.Taking multi-labeled tokens into account, thenumerous possible paths can distract the train-ing model from the gold path (ground truthlabel sequence), and thus hinders the learn-ing ability. In this paper, we propose AdaK-NER, named the adaptive top-Kapproach, tohelp the model focus on a smaller feasible re-gion where the gold path is more likely to belocated. We demonstrate the superiority ofour approach through extensive experimentson both English and Chinese datasets, aver-agely improving 2% in F-score on the CoNLL-2003 and over 10% on two Chinese datasetscompared with the prior state-of-the-art works.
△ Less
Submitted 8 June, 2022; v1 submitted 11 September, 2021;
originally announced September 2021.
-
Coefficients of the $Σ_3$-equivariant complex cobordism ring
Authors:
Po Hu,
Igor Kriz,
Yunze Lu
Abstract:
In this paper, we calculate the coefficient ring of equivariant Thom complex cobordism for the symmetric group on three elements. We also make some remarks on general methods of calculating certain pullbacks of rings which typically occur in calculations of equivariant cobordism.
In this paper, we calculate the coefficient ring of equivariant Thom complex cobordism for the symmetric group on three elements. We also make some remarks on general methods of calculating certain pullbacks of rings which typically occur in calculations of equivariant cobordism.
△ Less
Submitted 2 September, 2021;
originally announced September 2021.
-
Equivariant formal group laws and complex-oriented spectra over primary cyclic groups: Elliptic curves, Barsotti-Tate groups, and other examples
Authors:
Po Hu,
Igor Kriz,
Petr Somberg
Abstract:
We explicitly construct and investigate a number of examples of $\mathbb{Z}/p^r$-equivariant formal group laws and complex-oriented spectra, including those coming from elliptic curves and $p$-divisible groups, as well as some other related examples.
We explicitly construct and investigate a number of examples of $\mathbb{Z}/p^r$-equivariant formal group laws and complex-oriented spectra, including those coming from elliptic curves and $p$-divisible groups, as well as some other related examples.
△ Less
Submitted 31 August, 2021;
originally announced September 2021.
-
Nigral diffusivity, but not free water, correlates with iron content in Parkinson's disease
Authors:
Jason Langley,
Daniel E. Huddleston,
Xiaoping P. Hu
Abstract:
The loss of melanized neurons in the substantia nigra pars compacta is a primary feature in Parkinson's disease (PD). Iron deposition occurs in conjunction with this loss. Loss of nigral neurons should remove barriers for diffusion and increase diffusivity of water molecules in regions undergoing this loss. In metrics from single-compartment diffusion tensor imaging models, these changes should ma…
▽ More
The loss of melanized neurons in the substantia nigra pars compacta is a primary feature in Parkinson's disease (PD). Iron deposition occurs in conjunction with this loss. Loss of nigral neurons should remove barriers for diffusion and increase diffusivity of water molecules in regions undergoing this loss. In metrics from single-compartment diffusion tensor imaging models, these changes should manifest as increases in mean diffusivity and the free water compartment as well as and reductions in fractional anisotropy. However, studies examining nigral diffusivity changes from PD with single-compartment models have yielded inconclusive results and emerging evidence in control subjects indicates that iron corrupts diffusivity metrics derived from single-compartment models.
Iron-sensitive data and diffusion data were analyzed in two cohorts. The effect of iron on diffusion measures from single- and bi-compartment models was assessed in both cohorts.
Measures sensitive to the free water compartment and iron content were found to increase in substantia nigra of the PD group in both cohorts. However, diffusion markers derived from the single-compartment model were not replicated across cohorts. Correlations were seen between single-compartment diffusion measures and iron markers in the discovery cohort and validation cohort but no correlation was observed between a measure from the bi-compartment model related to the free water compartment and iron markers in either cohort.
The variability of single-compartment nigral diffusion metrics in PD may be attributed to competing influences of increased iron content, which drives diffusivity down, and increases in the free water compartment, which drives diffusivity up. In contrast to diffusion metrics derived from the single-compartment model, no relationship was seen between iron and the free water compartment in substantia nigra.
△ Less
Submitted 17 August, 2021;
originally announced August 2021.