-
Seed-ASR: Understanding Diverse Speech and Contexts with LLM-based Speech Recognition
Authors:
Ye Bai,
Jingping Chen,
Jitong Chen,
Wei Chen,
Zhuo Chen,
Chuang Ding,
Linhao Dong,
Qianqian Dong,
Yujiao Du,
Kepan Gao,
Lu Gao,
Yi Guo,
Minglun Han,
Ting Han,
Wenchao Hu,
Xinying Hu,
Yuxiang Hu,
Deyu Hua,
Lu Huang,
Mingkun Huang,
Youjia Huang,
Jishuo Jin,
Fanliu Kong,
Zongwei Lan,
Tianyu Li
, et al. (30 additional authors not shown)
Abstract:
Modern automatic speech recognition (ASR) model is required to accurately transcribe diverse speech signals (from different domains, languages, accents, etc) given the specific contextual information in various application scenarios. Classic end-to-end models fused with extra language models perform well, but mainly in data matching scenarios and are gradually approaching a bottleneck. In this wor…
▽ More
Modern automatic speech recognition (ASR) model is required to accurately transcribe diverse speech signals (from different domains, languages, accents, etc) given the specific contextual information in various application scenarios. Classic end-to-end models fused with extra language models perform well, but mainly in data matching scenarios and are gradually approaching a bottleneck. In this work, we introduce Seed-ASR, a large language model (LLM) based speech recognition model. Seed-ASR is developed based on the framework of audio conditioned LLM (AcLLM), leveraging the capabilities of LLMs by inputting continuous speech representations together with contextual information into the LLM. Through stage-wise large-scale training and the elicitation of context-aware capabilities in LLM, Seed-ASR demonstrates significant improvement over end-to-end models on comprehensive evaluation sets, including multiple domains, accents/dialects and languages. Additionally, Seed-ASR can be further deployed to support specific needs in various scenarios without requiring extra language models. Compared to recently released large ASR models, Seed-ASR achieves 10%-40% reduction in word (or character, for Chinese) error rates on Chinese and English public test sets, further demonstrating its powerful performance.
△ Less
Submitted 10 July, 2024; v1 submitted 5 July, 2024;
originally announced July 2024.
-
DenoDet: Attention as Deformable Multi-Subspace Feature Denoising for Target Detection in SAR Images
Authors:
Yimian Dai,
Minrui Zou,
Yuxuan Li,
Xiang Li,
Kang Ni,
Jian Yang
Abstract:
Synthetic Aperture Radar (SAR) target detection has long been impeded by inherent speckle noise and the prevalence of diminutive, ambiguous targets. While deep neural networks have advanced SAR target detection, their intrinsic low-frequency bias and static post-training weights falter with coherent noise and preserving subtle details across heterogeneous terrains. Motivated by traditional SAR ima…
▽ More
Synthetic Aperture Radar (SAR) target detection has long been impeded by inherent speckle noise and the prevalence of diminutive, ambiguous targets. While deep neural networks have advanced SAR target detection, their intrinsic low-frequency bias and static post-training weights falter with coherent noise and preserving subtle details across heterogeneous terrains. Motivated by traditional SAR image denoising, we propose DenoDet, a network aided by explicit frequency domain transform to calibrate convolutional biases and pay more attention to high-frequencies, forming a natural multi-scale subspace representation to detect targets from the perspective of multi-subspace denoising. We design TransDeno, a dynamic frequency domain attention module that performs as a transform domain soft thresholding operation, dynamically denoising across subspaces by preserving salient target signals and attenuating noise. To adaptively adjust the granularity of subspace processing, we also propose a deformable group fully-connected layer (DeGroFC) that dynamically varies the group conditioned on the input features. Without bells and whistles, our plug-and-play TransDeno sets state-of-the-art scores on multiple SAR target detection datasets. The code is available at https://github.com/GrokCV/GrokSAR.
△ Less
Submitted 4 June, 2024;
originally announced June 2024.
-
Cascade Network Stability of Synchronized Traffic Load Balancing with Heterogeneous Energy Efficiency Policies
Authors:
Mengbang Zou,
Weisi Guo
Abstract:
Cascade stability of load balancing is critical for ensuring high efficiency service delivery and preventing undesirable handovers. In energy efficient networks that employ diverse sleep mode operations, handing over traffic to neighbouring cells' expanded coverage must be done with minimal side effects. Current research is largely concerned with designing distributed and centralized efficient loa…
▽ More
Cascade stability of load balancing is critical for ensuring high efficiency service delivery and preventing undesirable handovers. In energy efficient networks that employ diverse sleep mode operations, handing over traffic to neighbouring cells' expanded coverage must be done with minimal side effects. Current research is largely concerned with designing distributed and centralized efficient load balancing policies that are locally stable. There is a major research gap in identifying large-scale cascade stability for networks with heterogeneous load balancing policies arising from diverse plug-and-play sleep mode policies in ORAN, which will cause heterogeneity in the network stability behaviour.
Here, we investigate whether cells arbitrarily connected for load balancing and having an arbitrary number undergoing sleep mode can: (i) synchronize to a desirable load-balancing state, and (ii) maintain stability. For the first time, we establish the criterion for stability and prove its validity for any general load dynamics and random network topology. Whilst its general form allows all load balancing and sleep mode dynamics to be incorporated, we propose an ORAN architecture where the network service management and orchestration (SMO) must monitor new load balancing policies to ensure overall network cascade stability.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
BiSup: Bidirectional Quantization Error Suppression for Large Language Models
Authors:
Minghui Zou,
Ronghui Guo,
Sai Zhang,
Xiaowang Zhang,
Zhiyong Feng
Abstract:
As the size and context length of Large Language Models (LLMs) grow, weight-activation quantization has emerged as a crucial technique for efficient deployment of LLMs. Compared to weight-only quantization, weight-activation quantization presents greater challenges due to the presence of outliers in activations. Existing methods have made significant progress by exploring mixed-precision quantizat…
▽ More
As the size and context length of Large Language Models (LLMs) grow, weight-activation quantization has emerged as a crucial technique for efficient deployment of LLMs. Compared to weight-only quantization, weight-activation quantization presents greater challenges due to the presence of outliers in activations. Existing methods have made significant progress by exploring mixed-precision quantization and outlier suppression. However, these methods primarily focus on optimizing the results of single matrix multiplication, neglecting the bidirectional propagation of quantization errors in LLMs. Specifically, errors accumulate vertically within the same token through layers, and diffuse horizontally across different tokens due to self-attention mechanisms. To address this issue, we introduce BiSup, a Bidirectional quantization error Suppression method. By constructing appropriate optimizable parameter spaces, BiSup utilizes a small amount of data for quantization-aware parameter-efficient fine-tuning to suppress the error vertical accumulation. Besides, BiSup employs prompt mixed-precision quantization strategy, which preserves high precision for the key-value cache of system prompts, to mitigate the error horizontal diffusion. Extensive experiments on Llama and Qwen families demonstrate that BiSup can improve performance over two state-of-the-art methods (the average WikiText2 perplexity decreases from 13.26 to 9.41 for Atom and from 14.33 to 7.85 for QuaRot under the W3A3-g128 configuration), further facilitating the practical applications of low-bit weight-activation quantization.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Semantic Contextualization of Face Forgery: A New Definition, Dataset, and Detection Method
Authors:
Mian Zou,
Baosheng Yu,
Yibing Zhan,
Siwei Lyu,
Kede Ma
Abstract:
In recent years, deep learning has greatly streamlined the process of generating realistic fake face images. Aware of the dangers, researchers have developed various tools to spot these counterfeits. Yet none asked the fundamental question: What digital manipulations make a real photographic face image fake, while others do not? In this paper, we put face forgery in a semantic context and define t…
▽ More
In recent years, deep learning has greatly streamlined the process of generating realistic fake face images. Aware of the dangers, researchers have developed various tools to spot these counterfeits. Yet none asked the fundamental question: What digital manipulations make a real photographic face image fake, while others do not? In this paper, we put face forgery in a semantic context and define that computational methods that alter semantic face attributes to exceed human discrimination thresholds are sources of face forgery. Guided by our new definition, we construct a large face forgery image dataset, where each image is associated with a set of labels organized in a hierarchical graph. Our dataset enables two new testing protocols to probe the generalization of face forgery detectors. Moreover, we propose a semantics-oriented face forgery detection method that captures label relations and prioritizes the primary task (\ie, real or fake face detection). We show that the proposed dataset successfully exposes the weaknesses of current detectors as the test set and consistently improves their generalizability as the training set. Additionally, we demonstrate the superiority of our semantics-oriented method over traditional binary and multi-class classification-based detectors.
△ Less
Submitted 14 May, 2024;
originally announced May 2024.
-
Field test of mode-pairing quantum key distribution
Authors:
Hao-Tao Zhu,
Yizhi Huang,
Wen-Xin Pan,
Chao-Wu Zhou,
Jianjun Tang,
Hong He,
Ming Cheng,
Xiandu Jin,
Mi Zou,
Shibiao Tang,
Xiongfeng Ma,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
Quantum key distribution is a cornerstone of quantum technology, offering information-theoretical secure keys for remote parties. With many quantum communication networks established globally, the mode-pairing protocol stands out for its efficacy over inter-city distances using simple setups, emerging as a promising solution. In this study, we employ the mode-pairing scheme into existing inter-cit…
▽ More
Quantum key distribution is a cornerstone of quantum technology, offering information-theoretical secure keys for remote parties. With many quantum communication networks established globally, the mode-pairing protocol stands out for its efficacy over inter-city distances using simple setups, emerging as a promising solution. In this study, we employ the mode-pairing scheme into existing inter-city fiber links, conducting field tests across distances ranging from tens to about a hundred kilometers. Our system achieves a key rate of $1.217$ kbit/s in a $195.85$ km symmetric link and $3.089$ kbit/s in a $127.92$ km asymmetric link without global phase locking. The results demonstrate that the mode-pairing protocol can achieve key rates comparable to those of a single quantum link between two trusted nodes on the Beijing-Shanghai backbone line, effectively reducing the need for half of the trusted nodes. These field tests confirm the mode-pairing scheme's adaptability, efficiency, and practicality, positioning it as a highly suitable protocol for quantum networks.
△ Less
Submitted 14 March, 2024;
originally announced March 2024.
-
A Simple Baseline for Efficient Hand Mesh Reconstruction
Authors:
Zhishan Zhou,
Shihao. zhou,
Zhi Lv,
Minqiang Zou,
Yao Tang,
Jiajun Liang
Abstract:
3D hand pose estimation has found broad application in areas such as gesture recognition and human-machine interaction tasks. As performance improves, the complexity of the systems also increases, which can limit the comparative analysis and practical implementation of these methods. In this paper, we propose a simple yet effective baseline that not only surpasses state-of-the-art (SOTA) methods b…
▽ More
3D hand pose estimation has found broad application in areas such as gesture recognition and human-machine interaction tasks. As performance improves, the complexity of the systems also increases, which can limit the comparative analysis and practical implementation of these methods. In this paper, we propose a simple yet effective baseline that not only surpasses state-of-the-art (SOTA) methods but also demonstrates computational efficiency. To establish this baseline, we abstract existing work into two components: a token generator and a mesh regressor, and then examine their core structures. A core structure, in this context, is one that fulfills intrinsic functions, brings about significant improvements, and achieves excellent performance without unnecessary complexities. Our proposed approach is decoupled from any modifications to the backbone, making it adaptable to any modern models. Our method outperforms existing solutions, achieving state-of-the-art (SOTA) results across multiple datasets. On the FreiHAND dataset, our approach produced a PA-MPJPE of 5.7mm and a PA-MPVPE of 6.0mm. Similarly, on the Dexycb dataset, we observed a PA-MPJPE of 5.5mm and a PA-MPVPE of 5.0mm. As for performance speed, our method reached up to 33 frames per second (fps) when using HRNet and up to 70 fps when employing FastViT-MA36
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Minimize Control Inputs for Strong Structural Controllability Using Reinforcement Learning with Graph Neural Network
Authors:
Mengbang Zou,
Weisi Guo,
Bailu Jin
Abstract:
Strong structural controllability (SSC) guarantees networked system with linear-invariant dynamics controllable for all numerical realizations of parameters. Current research has established algebraic and graph-theoretic conditions of SSC for zero/nonzero or zero/nonzero/arbitrary structure. One relevant practical problem is how to fully control the system with the minimal number of input signals…
▽ More
Strong structural controllability (SSC) guarantees networked system with linear-invariant dynamics controllable for all numerical realizations of parameters. Current research has established algebraic and graph-theoretic conditions of SSC for zero/nonzero or zero/nonzero/arbitrary structure. One relevant practical problem is how to fully control the system with the minimal number of input signals and identify which nodes must be imposed signals. Previous work shows that this optimization problem is NP-hard and it is difficult to find the solution. To solve this problem, we formulate the graph coloring process as a Markov decision process (MDP) according to the graph-theoretical condition of SSC for both zero/nonzero and zero/nonzero/arbitrary structure. We use Actor-critic method with Directed graph neural network which represents the color information of graph to optimize MDP. Our method is validated in a social influence network with real data and different complex network models. We find that the number of input nodes is determined by the average degree of the network and the input nodes tend to select nodes with low in-degree and avoid high-degree nodes.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Two-Dimensional Phase-Fluctuating Superconductivity in Bulk-Crystalline NdO$_{0.5}$F$_{0.5}$BiS$_2$
Authors:
C. S. Chen,
J. Küspert,
I. Biało,
J. Mueller,
K. W. Chen,
M. Y. Zou,
D. G. Mazzone,
D. Bucher,
K. Tanaka,
O. Ivashko,
M. v. Zimmermann,
Qisi Wang,
Lei Shu,
J. Chang
Abstract:
We present a combined growth and transport study of superconducting single-crystalline NdO$_{0.5}$F$_{0.5}$BiS$_2$. Evidence of two-dimensional superconductivity with significant phase fluctuations of preformed Cooper pairs preceding the superconducting transition is reported. This result is based on three key observations. (1) The resistive superconducting transition temperature $T_c$ (defined by…
▽ More
We present a combined growth and transport study of superconducting single-crystalline NdO$_{0.5}$F$_{0.5}$BiS$_2$. Evidence of two-dimensional superconductivity with significant phase fluctuations of preformed Cooper pairs preceding the superconducting transition is reported. This result is based on three key observations. (1) The resistive superconducting transition temperature $T_c$ (defined by resistivity $ρ\rightarrow 0$) increases with increasing disorder. (2) As $T\rightarrow T_c$, the conductivity diverges significantly faster than what is expected from Gaussian fluctuations in two and three dimensions. (3) Non-Ohmic resistance behavior is observed in the superconducting state. Altogether, our observations are consistent with a temperature regime of phase-fluctuating superconductivity. The crystal structure with magnetic ordering tendencies in the NdO$_{0.5}$F$_{0.5}$ layers and (super)conductivity in the BiS$_2$ layers is likely responsible for the two-dimensional phase fluctuations. As such, NdO$_{0.5}$F$_{0.5}$BiS$_2$ falls into the class of unconventional ``laminar" bulk superconductors that include cuprate materials and 4Hb-TaS$_2$.
△ Less
Submitted 24 February, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
A regularity criterion for the 3D Boussinesq equations in homogeneous Besov spaces with negative indices
Authors:
Mianlu Zou,
Qiang Li
Abstract:
In this paper, we study the regularity criteria for the 3D Boussinesq equations in terms of one partial derivative of the velocity in Besov spaces. More precisely, it is proved that if the velocity $u$ holds $\int_{0}^{T}\| \partial_{3} u\|_{\dot{B}_{\infty,\infty}^{-r}}^{\frac{2}{1-r}}\mbox{d}t<\infty,\ with\ \ 0\leq r<1$, then the solution $(u, θ)$ is regular on $[0,T]$.
In this paper, we study the regularity criteria for the 3D Boussinesq equations in terms of one partial derivative of the velocity in Besov spaces. More precisely, it is proved that if the velocity $u$ holds $\int_{0}^{T}\| \partial_{3} u\|_{\dot{B}_{\infty,\infty}^{-r}}^{\frac{2}{1-r}}\mbox{d}t<\infty,\ with\ \ 0\leq r<1$, then the solution $(u, θ)$ is regular on $[0,T]$.
△ Less
Submitted 17 January, 2024; v1 submitted 17 January, 2024;
originally announced January 2024.
-
Nonreciprocal Ballistic Transport in Asymmetric Bands
Authors:
Minhao Zou,
Hao Geng,
Rong Ma,
Wei Chen,
Li Sheng,
Dingyu Xing
Abstract:
Nonreciprocal transport in uniform systems has attracted great research interest recently and the existing theories mainly focus on the diffusive regime. In this study, we uncover a novel scenario for nonreciprocal charge transport in the ballistic regime enabled by asymmetric band structures of the system. The asymmetry of the bands induces unequal Coulomb potentials within the system as the bias…
▽ More
Nonreciprocal transport in uniform systems has attracted great research interest recently and the existing theories mainly focus on the diffusive regime. In this study, we uncover a novel scenario for nonreciprocal charge transport in the ballistic regime enabled by asymmetric band structures of the system. The asymmetry of the bands induces unequal Coulomb potentials within the system as the bias voltage imposed by the electrodes inverts its sign. As a result, the bands undergo different energy shifts as the current flows in opposite directions, giving rise to the nonreciprocity. Utilizing the gauge-invariant nonlinear transport theory, we show that the nonreciprocal transport predominantly originates from the second-order conductance, which violates the Onsager reciprocal relation but fulfills a generalized reciprocal relation similar to that of unidirectional magnetoresistance. The ballistic nonreciprocal transport phenomena differ from the diffusive ones by considering the internal asymmetric Coulomb potential, a factor not accounted for in diffusive cases but undeniably crucial in ballistic scenarios. Our work opens a avenue for implementing nonreciprocal transport in the ballistic regime and provides an alternative perspective for further experimental explorations for nonreciprocal transport.
△ Less
Submitted 20 December, 2023;
originally announced December 2023.
-
Attribute Simulation for Item Embedding Enhancement in Multi-interest Recommendation
Authors:
Yaokun Liu,
Xiaowang Zhang,
Minghui Zou,
Zhiyong Feng
Abstract:
Although multi-interest recommenders have achieved significant progress in the matching stage, our research reveals that existing models tend to exhibit an under-clustered item embedding space, which leads to a low discernibility between items and hampers item retrieval. This highlights the necessity for item embedding enhancement. However, item attributes, which serve as effective and straightfor…
▽ More
Although multi-interest recommenders have achieved significant progress in the matching stage, our research reveals that existing models tend to exhibit an under-clustered item embedding space, which leads to a low discernibility between items and hampers item retrieval. This highlights the necessity for item embedding enhancement. However, item attributes, which serve as effective and straightforward side information for enhancement, are either unavailable or incomplete in many public datasets due to the labor-intensive nature of manual annotation tasks. This dilemma raises two meaningful questions: 1. Can we bypass manual annotation and directly simulate complete attribute information from the interaction data? And 2. If feasible, how to simulate attributes with high accuracy and low complexity in the matching stage?
In this paper, we first establish an inspiring theoretical feasibility that the item-attribute correlation matrix can be approximated through elementary transformations on the item co-occurrence matrix. Then based on formula derivation, we propose a simple yet effective module, SimEmb (Item Embedding Enhancement via Simulated Attribute), in the multi-interest recommendation of the matching stage to implement our findings. By simulating attributes with the co-occurrence matrix, SimEmb discards the item ID-based embedding and employs the attribute-weighted summation for item embedding enhancement. Comprehensive experiments on four benchmark datasets demonstrate that our approach notably enhances the clustering of item embedding and significantly outperforms SOTA models with an average improvement of 25.59% on Recall@20.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
Charged Particle Motion in Neutron Star Magnetic Fields: A Comparison Between the Boris Algorithm and the Guiding Center Approximation
Authors:
Minghao Zou,
Bart Ripperda
Abstract:
Neutron star emission originates typically from its magnetosphere due to radiating electrons. Trajectories of relativistic charged particles under uniform electromagnetic fields can be calculated analytically. However, under more complex and realistic fields, numerical solutions are required. Two common schemes are the Boris method, which solves the full equations of motion, and the guiding center…
▽ More
Neutron star emission originates typically from its magnetosphere due to radiating electrons. Trajectories of relativistic charged particles under uniform electromagnetic fields can be calculated analytically. However, under more complex and realistic fields, numerical solutions are required. Two common schemes are the Boris method, which solves the full equations of motion, and the guiding center approximation (GCA), which only evolves the orbital center. We compare both methods in a series of tests, discuss their characteristics and quantify their accuracy. We apply the methods to dipolar, quadrupolar, and quadrudipolar magnetic fields, as applicable for magnetospheres. It is essential to consider such realistic neutron star magnetic field geometries to model the emission from magnetars and pulsars. Our work can assist the Neutron Star Interior Composition ExploreR (NICER) to understand emission from the surface and magnetosphere of neutron stars and to study their composition.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
Evidence of spin density waves in La$_3$Ni$_2$O$_{7-δ}$
Authors:
Kaiwen Chen,
Xiangqi Liu,
Jiachen Jiao,
Muyuan Zou,
Yixuan Luo,
Qiong Wu,
Ningyuan Zhang,
Yanfeng Guo,
Lei Shu
Abstract:
The recently discovered superconductivity with critical temperature $T_c$ up to 80 K in the double-layer Nickelate La$_3$Ni$_2$O$_{7-δ}$ under pressure has drawn great attention. Here we report the positive muon spin relaxation ($μ^+$SR) study of polycrystalline La$_3$Ni$_2$O$_{6.92}$ under ambient pressure. Zero-field $μ^+$SR experiments reveal the existence of magnetic order in La$_3$Ni$_2$O…
▽ More
The recently discovered superconductivity with critical temperature $T_c$ up to 80 K in the double-layer Nickelate La$_3$Ni$_2$O$_{7-δ}$ under pressure has drawn great attention. Here we report the positive muon spin relaxation ($μ^+$SR) study of polycrystalline La$_3$Ni$_2$O$_{6.92}$ under ambient pressure. Zero-field $μ^+$SR experiments reveal the existence of magnetic order in La$_3$Ni$_2$O$_{6.92}$ with $T_{N}=154\ \rm{K}$. The weak transverse field $μ^+$SR measurements confirms the bulk nature of magnetism. In addition, a small quantity of oxygen deficiencies can greatly broaden the internal magnetic field distribution sensed by muons.
△ Less
Submitted 13 May, 2024; v1 submitted 27 November, 2023;
originally announced November 2023.
-
Isomorphism Classes of Idempotent Evolution Algebras
Authors:
Yangjiang Wei,
Yi Ming Zou
Abstract:
We showed that isomorphism classes of idempotent evolution algebras are in bijection with the orbits of the semidirect product group of the symmetric group and the torus, considered the combinatoric problem of enumeration of isomorphism classes for these algebras over arbitrary finite fields, derived a general counting formula, and obtained explicit formulas for the numbers of isomorphism classes…
▽ More
We showed that isomorphism classes of idempotent evolution algebras are in bijection with the orbits of the semidirect product group of the symmetric group and the torus, considered the combinatoric problem of enumeration of isomorphism classes for these algebras over arbitrary finite fields, derived a general counting formula, and obtained explicit formulas for the numbers of isomorphism classes in dimensions 2, 3, and 4 over any finite field.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
TDPP: Two-Dimensional Permutation-Based Protection of Memristive Deep Neural Networks
Authors:
Minhui Zou,
Zhenhua Zhu,
Tzofnat Greenberg-Toledo,
Orian Leitersdorf,
Jiang Li,
Junlong Zhou,
Yu Wang,
Nan Du,
Shahar Kvatinsky
Abstract:
The execution of deep neural network (DNN) algorithms suffers from significant bottlenecks due to the separation of the processing and memory units in traditional computer systems. Emerging memristive computing systems introduce an in situ approach that overcomes this bottleneck. The non-volatility of memristive devices, however, may expose the DNN weights stored in memristive crossbars to potenti…
▽ More
The execution of deep neural network (DNN) algorithms suffers from significant bottlenecks due to the separation of the processing and memory units in traditional computer systems. Emerging memristive computing systems introduce an in situ approach that overcomes this bottleneck. The non-volatility of memristive devices, however, may expose the DNN weights stored in memristive crossbars to potential theft attacks. Therefore, this paper proposes a two-dimensional permutation-based protection (TDPP) method that thwarts such attacks. We first introduce the underlying concept that motivates the TDPP method: permuting both the rows and columns of the DNN weight matrices. This contrasts with previous methods, which focused solely on permuting a single dimension of the weight matrices, either the rows or columns. While it's possible for an adversary to access the matrix values, the original arrangement of rows and columns in the matrices remains concealed. As a result, the extracted DNN model from the accessed matrix values would fail to operate correctly. We consider two different memristive computing systems (designed for layer-by-layer and layer-parallel processing, respectively) and demonstrate the design of the TDPP method that could be embedded into the two systems. Finally, we present a security analysis. Our experiments demonstrate that TDPP can achieve comparable effectiveness to prior approaches, with a high level of security when appropriately parameterized. In addition, TDPP is more scalable than previous methods and results in reduced area and power overheads. The area and power are reduced by, respectively, 1218$\times$ and 2815$\times$ for the layer-by-layer system and by 178$\times$ and 203$\times$ for the layer-parallel system compared to prior works.
△ Less
Submitted 10 October, 2023;
originally announced October 2023.
-
1st Place Solution of Egocentric 3D Hand Pose Estimation Challenge 2023 Technical Report:A Concise Pipeline for Egocentric Hand Pose Reconstruction
Authors:
Zhishan Zhou,
Zhi Lv,
Shihao Zhou,
Minqiang Zou,
Tong Wu,
Mochen Yu,
Yao Tang,
Jiajun Liang
Abstract:
This report introduce our work on Egocentric 3D Hand Pose Estimation workshop. Using AssemblyHands, this challenge focuses on egocentric 3D hand pose estimation from a single-view image. In the competition, we adopt ViT based backbones and a simple regressor for 3D keypoints prediction, which provides strong model baselines. We noticed that Hand-objects occlusions and self-occlusions lead to perfo…
▽ More
This report introduce our work on Egocentric 3D Hand Pose Estimation workshop. Using AssemblyHands, this challenge focuses on egocentric 3D hand pose estimation from a single-view image. In the competition, we adopt ViT based backbones and a simple regressor for 3D keypoints prediction, which provides strong model baselines. We noticed that Hand-objects occlusions and self-occlusions lead to performance degradation, thus proposed a non-model method to merge multi-view results in the post-process stage. Moreover, We utilized test time augmentation and model ensemble to make further improvement. We also found that public dataset and rational preprocess are beneficial. Our method achieved 12.21mm MPJPE on test dataset, achieve the first place in Egocentric 3D Hand Pose Estimation challenge.
△ Less
Submitted 9 October, 2023; v1 submitted 7 October, 2023;
originally announced October 2023.
-
GVD-Exploration: An Efficient Autonomous Robot Exploration Framework Based on Fast Generalized Voronoi Diagram Extraction
Authors:
Dingfeng Chen,
Anxing Xiao,
Meiyuan Zou,
Wenzheng Chi,
Jiankun Wang,
Lining Sun
Abstract:
Rapidly-exploring Random Trees (RRTs) are a popular technique for autonomous exploration of mobile robots. However, the random sampling used by RRTs can result in inefficient and inaccurate frontiers extraction, which affects the exploration performance. To address the issues of slow path planning and high path cost, we propose a framework that uses a generalized Voronoi diagram (GVD) based multi-…
▽ More
Rapidly-exploring Random Trees (RRTs) are a popular technique for autonomous exploration of mobile robots. However, the random sampling used by RRTs can result in inefficient and inaccurate frontiers extraction, which affects the exploration performance. To address the issues of slow path planning and high path cost, we propose a framework that uses a generalized Voronoi diagram (GVD) based multi-choice strategy for robot exploration. Our framework consists of three components: a novel mapping model that uses an end-to-end neural network to construct GVDs of the environments in real time; a GVD-based heuristic scheme that accelerates frontiers extraction and reduces frontiers redundancy; and a multi-choice frontiers assignment scheme that considers different types of frontiers and enables the robot to make rational decisions during the exploration process. We evaluate our method on simulation and real-world experiments and show that it outperforms RRT-based exploration methods in terms of efficiency and robustness.
△ Less
Submitted 12 September, 2023;
originally announced September 2023.
-
Towards Discriminative Representations with Contrastive Instances for Real-Time UAV Tracking
Authors:
Dan Zeng,
Mingliang Zou,
Xucheng Wang,
Shuiwang Li
Abstract:
Maintaining high efficiency and high precision are two fundamental challenges in UAV tracking due to the constraints of computing resources, battery capacity, and UAV maximum load. Discriminative correlation filters (DCF)-based trackers can yield high efficiency on a single CPU but with inferior precision. Lightweight Deep learning (DL)-based trackers can achieve a good balance between efficiency…
▽ More
Maintaining high efficiency and high precision are two fundamental challenges in UAV tracking due to the constraints of computing resources, battery capacity, and UAV maximum load. Discriminative correlation filters (DCF)-based trackers can yield high efficiency on a single CPU but with inferior precision. Lightweight Deep learning (DL)-based trackers can achieve a good balance between efficiency and precision but performance gains are limited by the compression rate. High compression rate often leads to poor discriminative representations. To this end, this paper aims to enhance the discriminative power of feature representations from a new feature-learning perspective. Specifically, we attempt to learn more disciminative representations with contrastive instances for UAV tracking in a simple yet effective manner, which not only requires no manual annotations but also allows for developing and deploying a lightweight model. We are the first to explore contrastive learning for UAV tracking. Extensive experiments on four UAV benchmarks, including UAV123@10fps, DTB70, UAVDT and VisDrone2018, show that the proposed DRCI tracker significantly outperforms state-of-the-art UAV tracking methods.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
UniG-Encoder: A Universal Feature Encoder for Graph and Hypergraph Node Classification
Authors:
Minhao Zou,
Zhongxue Gan,
Yutong Wang,
Junheng Zhang,
Dongyan Sui,
Chun Guan,
Siyang Leng
Abstract:
Graph and hypergraph representation learning has attracted increasing attention from various research fields. Despite the decent performance and fruitful applications of Graph Neural Networks (GNNs), Hypergraph Neural Networks (HGNNs), and their well-designed variants, on some commonly used benchmark graphs and hypergraphs, they are outperformed by even a simple Multi-Layer Perceptron. This observ…
▽ More
Graph and hypergraph representation learning has attracted increasing attention from various research fields. Despite the decent performance and fruitful applications of Graph Neural Networks (GNNs), Hypergraph Neural Networks (HGNNs), and their well-designed variants, on some commonly used benchmark graphs and hypergraphs, they are outperformed by even a simple Multi-Layer Perceptron. This observation motivates a reexamination of the design paradigm of the current GNNs and HGNNs and poses challenges of extracting graph features effectively. In this work, a universal feature encoder for both graph and hypergraph representation learning is designed, called UniG-Encoder. The architecture starts with a forward transformation of the topological relationships of connected nodes into edge or hyperedge features via a normalized projection matrix. The resulting edge/hyperedge features, together with the original node features, are fed into a neural network. The encoded node embeddings are then derived from the reversed transformation, described by the transpose of the projection matrix, of the network's output, which can be further used for tasks such as node classification. The proposed architecture, in contrast to the traditional spectral-based and/or message passing approaches, simultaneously and comprehensively exploits the node features and graph/hypergraph topologies in an efficient and unified manner, covering both heterophilic and homophilic graphs. The designed projection matrix, encoding the graph features, is intuitive and interpretable. Extensive experiments are conducted and demonstrate the superior performance of the proposed framework on twelve representative hypergraph datasets and six real-world graph datasets, compared to the state-of-the-art methods. Our implementation is available online at https://github.com/MinhZou/UniG-Encoder.
△ Less
Submitted 3 August, 2023;
originally announced August 2023.
-
HiHGNN: Accelerating HGNNs through Parallelism and Data Reusability Exploitation
Authors:
Runzhen Xue,
Dengke Han,
Mingyu Yan,
Mo Zou,
Xiaocheng Yang,
Duo Wang,
Wenming Li,
Zhimin Tang,
John Kim,
Xiaochun Ye,
Dongrui Fan
Abstract:
Heterogeneous graph neural networks (HGNNs) have emerged as powerful algorithms for processing heterogeneous graphs (HetGs), widely used in many critical fields. To capture both structural and semantic information in HetGs, HGNNs first aggregate the neighboring feature vectors for each vertex in each semantic graph and then fuse the aggregated results across all semantic graphs for each vertex. Un…
▽ More
Heterogeneous graph neural networks (HGNNs) have emerged as powerful algorithms for processing heterogeneous graphs (HetGs), widely used in many critical fields. To capture both structural and semantic information in HetGs, HGNNs first aggregate the neighboring feature vectors for each vertex in each semantic graph and then fuse the aggregated results across all semantic graphs for each vertex. Unfortunately, existing graph neural network accelerators are ill-suited to accelerate HGNNs. This is because they fail to efficiently tackle the specific execution patterns and exploit the high-degree parallelism as well as data reusability inside and across the processing of semantic graphs in HGNNs.
In this work, we first quantitatively characterize a set of representative HGNN models on GPU to disclose the execution bound of each stage, inter-semantic-graph parallelism, and inter-semantic-graph data reusability in HGNNs. Guided by our findings, we propose a high-performance HGNN accelerator, HiHGNN, to alleviate the execution bound and exploit the newfound parallelism and data reusability in HGNNs. Specifically, we first propose a bound-aware stage-fusion methodology that tailors to HGNN acceleration, to fuse and pipeline the execution stages being aware of their execution bounds. Second, we design an independency-aware parallel execution design to exploit the inter-semantic-graph parallelism. Finally, we present a similarity-aware execution scheduling to exploit the inter-semantic-graph data reusability. Compared to the state-of-the-art software framework running on NVIDIA GPU T4 and GPU A100, HiHGNN respectively achieves an average 41.5$\times$ and 8.6$\times$ speedup as well as 106$\times$ and 73$\times$ energy efficiency with quarter the memory bandwidth of GPU A100.
△ Less
Submitted 26 April, 2024; v1 submitted 24 July, 2023;
originally announced July 2023.
-
How to Find Opinion Leader on the Online Social Network?
Authors:
Bailu Jin,
Mengbang Zou,
Zhuangkun Wei,
Weisi Guo
Abstract:
Online social networks (OSNs) provide a platform for individuals to share information, exchange ideas and build social connections beyond in-person interactions. For a specific topic or community, opinion leaders are individuals who have a significant influence on others' opinions. Detecting and modeling opinion leaders is crucial as they play a vital role in shaping public opinion and driving onl…
▽ More
Online social networks (OSNs) provide a platform for individuals to share information, exchange ideas and build social connections beyond in-person interactions. For a specific topic or community, opinion leaders are individuals who have a significant influence on others' opinions. Detecting and modeling opinion leaders is crucial as they play a vital role in shaping public opinion and driving online conversations. Existing research have extensively explored various methods for detecting opinion leaders, but there is a lack of consensus between definitions and methods. It is important to note that the term "important node" in graph theory does not necessarily align with the concept of "opinion leader" in social psychology. This paper aims to address this issue by introducing the methodologies for identifying influential nodes in OSNs and providing a corresponding definition of opinion leaders in relation to social psychology. The key novelty is to review connections and cross-compare different approaches that have origins in: graph theory, natural language processing, social psychology, control theory, and graph sampling. We discuss how they tell a different technical tale of influence and also propose how some of the approaches can be combined via networked dynamical systems modeling. A case study is performed on Twitter data to compare the performance of different methodologies discussed. The primary objective of this work is to elucidate the progression of opinion leader detection on OSNs and inspire further research in understanding the dynamics of opinion evolution within the field.
△ Less
Submitted 24 January, 2024; v1 submitted 7 June, 2023;
originally announced June 2023.
-
New Characterizations and Efficient Local Search for General Integer Linear Programming
Authors:
Peng Lin,
Shaowei Cai,
Mengchuan Zou,
Jinkun Lin
Abstract:
Integer linear programming (ILP) models a wide range of practical combinatorial optimization problems and significantly impacts industry and management sectors. This work proposes new characterizations of ILP with the concept of boundary solutions. Motivated by the new characterizations, we develop a new local search algorithm Local-ILP, which is efficient for solving general ILP validated on a la…
▽ More
Integer linear programming (ILP) models a wide range of practical combinatorial optimization problems and significantly impacts industry and management sectors. This work proposes new characterizations of ILP with the concept of boundary solutions. Motivated by the new characterizations, we develop a new local search algorithm Local-ILP, which is efficient for solving general ILP validated on a large heterogeneous problem dataset. We propose a new local search framework that switches between three modes, namely Search, Improve, and Restore modes. Two new operators are proposed, namely the tight move and the lift move operators, which are associated with appropriate scoring functions. Different modes apply different operators to realize different search strategies and the algorithm switches between three modes according to the current search state. Putting these together, we develop a local search ILP solver called Local-ILP. Experiments conducted on the MIPLIB dataset show the effectiveness of our algorithm in solving large-scale hard ILP problems. In the aspect of finding a good feasible solution quickly, Local-ILP is competitive and complementary to the state-of-the-art commercial solver Gurobi and significantly outperforms the state-of-the-art non-commercial solver SCIP. Moreover, our algorithm establishes new records for 6 MIPLIB open instances. The theoretical analysis of our algorithm is also presented, which shows our algorithm could avoid visiting unnecessary regions.
△ Less
Submitted 1 March, 2024; v1 submitted 29 April, 2023;
originally announced May 2023.
-
Review of security techniques for memristor computing systems
Authors:
Minhui Zou,
Nan Du,
Shahar Kvatinsky
Abstract:
Neural network (NN) algorithms have become the dominant tool in visual object recognition, natural language processing, and robotics. To enhance the computational efficiency of these algorithms, in comparison to the traditional von Neuman computing architectures, researchers have been focusing on memristor computing systems. A major drawback when using memristor computing systems today is that, in…
▽ More
Neural network (NN) algorithms have become the dominant tool in visual object recognition, natural language processing, and robotics. To enhance the computational efficiency of these algorithms, in comparison to the traditional von Neuman computing architectures, researchers have been focusing on memristor computing systems. A major drawback when using memristor computing systems today is that, in the artificial intelligence (AI) era, well-trained NN models are intellectual property and, when loaded in the memristor computing systems, face theft threats, especially when running in edge devices. An adversary may steal the well-trained NN models through advanced attacks such as learning attacks and side-channel analysis. In this paper, we review different security techniques for protecting memristor computing systems. Two threat models are described based on their assumptions regarding the adversary's capabilities: a black-box (BB) model and a white-box (WB) model. We categorize the existing security techniques into five classes in the context of these threat models: thwarting learning attacks (BB), thwarting side-channel attacks (BB), NN model encryption (WB), NN weight transformation (WB), and fingerprint embedding (WB). We also present a cross-comparison of the limitations of the security techniques. This paper could serve as an aid when designing secure memristor computing systems.
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
Neural Cell Video Synthesis via Optical-Flow Diffusion
Authors:
Manuel Serna-Aguilera,
Khoa Luu,
Nathaniel Harris,
Min Zou
Abstract:
The biomedical imaging world is notorious for working with small amounts of data, frustrating state-of-the-art efforts in the computer vision and deep learning worlds. With large datasets, it is easier to make progress we have seen from the natural image distribution. It is the same with microscopy videos of neuron cells moving in a culture. This problem presents several challenges as it can be di…
▽ More
The biomedical imaging world is notorious for working with small amounts of data, frustrating state-of-the-art efforts in the computer vision and deep learning worlds. With large datasets, it is easier to make progress we have seen from the natural image distribution. It is the same with microscopy videos of neuron cells moving in a culture. This problem presents several challenges as it can be difficult to grow and maintain the culture for days, and it is expensive to acquire the materials and equipment. In this work, we explore how to alleviate this data scarcity problem by synthesizing the videos. We, therefore, take the recent work of the video diffusion model to synthesize videos of cells from our training dataset. We then analyze the model's strengths and consistent shortcomings to guide us on improving video generation to be as high-quality as possible. To improve on such a task, we propose modifying the denoising function and adding motion information (dense optical flow) so that the model has more context regarding how video frames transition over time and how each pixel changes over time.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
Nonreciprocal Charge and Spin Transport Induced by Non-Hermitian Skin Effect in Mesoscopic Heterojunctions
Authors:
H. Geng,
J. Y. Wei,
M. H. Zou,
L. Sheng,
Wei Chen,
D. Y. Xing
Abstract:
The pursuit of the non-Hermitian skin effect (NHSE) in various physical systems is of great research interest. Compared with recent progress in non-electronic systems, the implementation of the NHSE in condensed matter physics remains elusive. Here, we show that the NHSE can be engineered in the mesoscopic heterojunctions (system plus reservoir) in which electrons in two channels of the system mov…
▽ More
The pursuit of the non-Hermitian skin effect (NHSE) in various physical systems is of great research interest. Compared with recent progress in non-electronic systems, the implementation of the NHSE in condensed matter physics remains elusive. Here, we show that the NHSE can be engineered in the mesoscopic heterojunctions (system plus reservoir) in which electrons in two channels of the system moving towards each other have asymmetric coupling to those of the reservoir. This makes electrons in the system moving forward and in the opposite direction have unequal lifetimes, and so gives rise to a point-gap spectral topology. Accordingly, the electron eigenstates exhibit NHSE under the open boundary condition, consistent with the description of the generalized Brillouin zone. Such a reservoir-engineered NHSE visibly manifests itself as the nonreciprocal charge current that can be probed by the standard transport measurements. Further, we generalize the scenario to the spin-resolved NHSE, which can be probed by the nonreciprocal spin transport. Our work opens a new research avenue for implementing and detecting the NHSE in electronic mesoscopic systems, which will lead to interesting device applications.
△ Less
Submitted 19 January, 2023; v1 submitted 21 September, 2022;
originally announced September 2022.
-
Experimental mode-pairing measurement-device-independent quantum key distribution without global phase-locking
Authors:
Hao-Tao Zhu,
Yizhi Huang,
Hui Liu,
Pei Zeng,
Mi Zou,
Yunqi Dai,
Shibiao Tang,
Hao Li,
Lixing You,
Zhen Wang,
Yu-Ao Chen,
Xiongfeng Ma,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
In the past two decades, quantum key distribution networks based on telecom fibers have been implemented on metropolitan and intercity scales. One of the bottlenecks lies in the exponential decay of the key rate with respect to the transmission distance. Recently proposed schemes mainly focus on achieving longer distances by creating a long-arm single-photon interferometer over two communication p…
▽ More
In the past two decades, quantum key distribution networks based on telecom fibers have been implemented on metropolitan and intercity scales. One of the bottlenecks lies in the exponential decay of the key rate with respect to the transmission distance. Recently proposed schemes mainly focus on achieving longer distances by creating a long-arm single-photon interferometer over two communication parties. Despite their advantageous performance over long communication distances, the requirement of phase-locking between two independent lasers is technically challenging. By adopting the recently-proposed mode-pairing idea, we realize high-performance quantum key distribution without global phase-locking. Using two independent off-the-shelf lasers, we show a quadratic key-rate improvement over the conventional measurement-device-independent schemes in the regime of metropolitan and intercity distances. For longer distances, we also boost the key rate performance by three orders of magnitude via 304 km commercial fiber and 407 km ultra-low-loss fiber. We expect this ready-to-implement high-performance scheme to be widely used in future intercity quantum communication networks.
△ Less
Submitted 9 February, 2023; v1 submitted 11 August, 2022;
originally announced August 2022.
-
Characterizing and Understanding HGNNs on GPUs
Authors:
Mingyu Yan,
Mo Zou,
Xiaocheng Yang,
Wenming Li,
Xiaochun Ye,
Dongrui Fan,
Yuan Xie
Abstract:
Heterogeneous graph neural networks (HGNNs) deliver powerful capacity in heterogeneous graph representation learning. The execution of HGNNs is usually accelerated by GPUs. Therefore, characterizing and understanding the execution pattern of HGNNs on GPUs is important for both software and hardware optimizations. Unfortunately, there is no detailed characterization effort of HGNN workloads on GPUs…
▽ More
Heterogeneous graph neural networks (HGNNs) deliver powerful capacity in heterogeneous graph representation learning. The execution of HGNNs is usually accelerated by GPUs. Therefore, characterizing and understanding the execution pattern of HGNNs on GPUs is important for both software and hardware optimizations. Unfortunately, there is no detailed characterization effort of HGNN workloads on GPUs. In this paper, we characterize HGNN workloads at inference phase and explore the execution of HGNNs on GPU, to disclose the execution semantic and execution pattern of HGNNs. Given the characterization and exploration, we propose several useful guidelines for both software and hardware optimizations for the efficient execution of HGNNs on GPUs.
△ Less
Submitted 9 August, 2022;
originally announced August 2022.
-
Enhancing Security of Memristor Computing System Through Secure Weight Mapping
Authors:
Minhui Zou,
Junlong Zhou,
Xiaotong Cui,
Wei Wang,
Shahar Kvatinsky
Abstract:
Emerging memristor computing systems have demonstrated great promise in improving the energy efficiency of neural network (NN) algorithms. The NN weights stored in memristor crossbars, however, may face potential theft attacks due to the nonvolatility of the memristor devices. In this paper, we propose to protect the NN weights by mapping selected columns of them in the form of 1's complements and…
▽ More
Emerging memristor computing systems have demonstrated great promise in improving the energy efficiency of neural network (NN) algorithms. The NN weights stored in memristor crossbars, however, may face potential theft attacks due to the nonvolatility of the memristor devices. In this paper, we propose to protect the NN weights by mapping selected columns of them in the form of 1's complements and leaving the other columns in their original form, preventing the adversary from knowing the exact representation of each weight. The results show that compared with prior work, our method achieves effectiveness comparable to the best of them and reduces the hardware overhead by more than 18X.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Global Contrast Masked Autoencoders Are Powerful Pathological Representation Learners
Authors:
Hao Quan,
Xingyu Li,
Weixing Chen,
Qun Bai,
Mingchen Zou,
Ruijie Yang,
Tingting Zheng,
Ruiqun Qi,
Xinghua Gao,
Xiaoyu Cui
Abstract:
Based on digital pathology slice scanning technology, artificial intelligence algorithms represented by deep learning have achieved remarkable results in the field of computational pathology. Compared to other medical images, pathology images are more difficult to annotate, and thus, there is an extreme lack of available datasets for conducting supervised learning to train robust deep learning mod…
▽ More
Based on digital pathology slice scanning technology, artificial intelligence algorithms represented by deep learning have achieved remarkable results in the field of computational pathology. Compared to other medical images, pathology images are more difficult to annotate, and thus, there is an extreme lack of available datasets for conducting supervised learning to train robust deep learning models. In this paper, we propose a self-supervised learning (SSL) model, the global contrast-masked autoencoder (GCMAE), which can train the encoder to have the ability to represent local-global features of pathological images, also significantly improve the performance of transfer learning across data sets. In this study, the ability of the GCMAE to learn migratable representations was demonstrated through extensive experiments using a total of three different disease-specific hematoxylin and eosin (HE)-stained pathology datasets: Camelyon16, NCTCRC and BreakHis. In addition, this study designed an effective automated pathology diagnosis process based on the GCMAE for clinical applications. The source code of this paper is publicly available at https://github.com/StarUniversus/gcmae.
△ Less
Submitted 15 November, 2023; v1 submitted 18 May, 2022;
originally announced May 2022.
-
Characterizing and Understanding Distributed GNN Training on GPUs
Authors:
Haiyang Lin,
Mingyu Yan,
Xiaocheng Yang,
Mo Zou,
Wenming Li,
Xiaochun Ye,
Dongrui Fan
Abstract:
Graph neural network (GNN) has been demonstrated to be a powerful model in many domains for its effectiveness in learning over graphs. To scale GNN training for large graphs, a widely adopted approach is distributed training which accelerates training using multiple computing nodes. Maximizing the performance is essential, but the execution of distributed GNN training remains preliminarily underst…
▽ More
Graph neural network (GNN) has been demonstrated to be a powerful model in many domains for its effectiveness in learning over graphs. To scale GNN training for large graphs, a widely adopted approach is distributed training which accelerates training using multiple computing nodes. Maximizing the performance is essential, but the execution of distributed GNN training remains preliminarily understood. In this work, we provide an in-depth analysis of distributed GNN training on GPUs, revealing several significant observations and providing useful guidelines for both software optimization and hardware optimization.
△ Less
Submitted 17 April, 2022;
originally announced April 2022.
-
Efficient Training of the Memristive Deep Belief Net Immune to Non-Idealities of the Synaptic Devices
Authors:
Wei Wang,
Barak Hoffer,
Tzofnat Greenberg-Toledo,
Yang Li,
Minhui Zou,
Eric Herbelin,
Ronny Ronen,
Xiaoxin Xu,
Yulin Zhao,
Jianguo Yang,
Shahar Kvatinsky
Abstract:
The tunability of conductance states of various emerging non-volatile memristive devices emulates the plasticity of biological synapses, making it promising in the hardware realization of large-scale neuromorphic systems. The inference of the neural network can be greatly accelerated by the vector-matrix multiplication (VMM) performed within a crossbar array of memristive devices in one step. Neve…
▽ More
The tunability of conductance states of various emerging non-volatile memristive devices emulates the plasticity of biological synapses, making it promising in the hardware realization of large-scale neuromorphic systems. The inference of the neural network can be greatly accelerated by the vector-matrix multiplication (VMM) performed within a crossbar array of memristive devices in one step. Nevertheless, the implementation of the VMM needs complex peripheral circuits and the complexity further increases since non-idealities of memristive devices prevent precise conductance tuning (especially for the online training) and largely degrade the performance of the deep neural networks (DNNs). Here, we present an efficient online training method of the memristive deep belief net (DBN). The proposed memristive DBN uses stochastically binarized activations, reducing the complexity of peripheral circuits, and uses the contrastive divergence (CD) based gradient descent learning algorithm. The analog VMM and digital CD are performed separately in a mixed-signal hardware arrangement, making the memristive DBN high immune to non-idealities of synaptic devices. The number of write operations on memristive devices is reduced by two orders of magnitude. The recognition accuracy of 95%~97% can be achieved for the MNIST dataset using pulsed synaptic behaviors of various memristive synaptic devices.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
Alleviating Datapath Conflicts and Design Centralization in Graph Analytics Acceleration
Authors:
Haiyang Lin,
Mingyu Yan,
Duo Wang,
Mo Zou,
Fengbin Tu,
Xiaochun Ye,
Dongrui Fan,
Yuan Xie
Abstract:
Previous graph analytics accelerators have achieved great improvement on throughput by alleviating irregular off-chip memory accesses. However, on-chip side datapath conflicts and design centralization have become the critical issues hindering further throughput improvement. In this paper, a general solution, Multiple-stage Decentralized Propagation network (MDP-network), is proposed to address th…
▽ More
Previous graph analytics accelerators have achieved great improvement on throughput by alleviating irregular off-chip memory accesses. However, on-chip side datapath conflicts and design centralization have become the critical issues hindering further throughput improvement. In this paper, a general solution, Multiple-stage Decentralized Propagation network (MDP-network), is proposed to address these issues, inspired by the key idea of trading latency for throughput. Besides, a novel High throughput Graph analytics accelerator, HiGraph, is proposed by deploying MDP-network to address each issue in practice. The experiment shows that compared with state-of-the-art accelerator, HiGraph achieves up to 2.2x speedup (1.5x on average) as well as better scalability.
△ Less
Submitted 23 February, 2022;
originally announced February 2022.
-
On Automorphism Groups of Idempotent Evolution Algebras
Authors:
Songpon Sriwongsa,
Yi Ming Zou
Abstract:
We study the automorphism group of an idempotent evolution algebra, show that any finite group can be the automorphism group of an evolution algebra, and describe certain evolution algebras with given automorphism groups. In particular, we classify $n$-dimensional idempotent evolution algebras whose automorphism group is isomorphic to the symmetric group $S_n$, and classify idempotent evolution al…
▽ More
We study the automorphism group of an idempotent evolution algebra, show that any finite group can be the automorphism group of an evolution algebra, and describe certain evolution algebras with given automorphism groups. In particular, we classify $n$-dimensional idempotent evolution algebras whose automorphism group is isomorphic to the symmetric group $S_n$, and classify idempotent evolution algebras with maximal diagonal automorphism subgroups.
△ Less
Submitted 11 February, 2022; v1 submitted 2 February, 2022;
originally announced February 2022.
-
Local assortativity affects the synchronizability of scale-free network
Authors:
Mengbang Zou,
Weisi Guo
Abstract:
Synchronization is critical for system level behaviour in physical, chemical, biological and social systems. Empirical evidence has shown that the network topology strongly impacts the synchronizablity of the system, and the analysis of their relationship remains an open challenge. We know that the eigenvalue distribution determines a network's synchronizability, but analytical expressions that co…
▽ More
Synchronization is critical for system level behaviour in physical, chemical, biological and social systems. Empirical evidence has shown that the network topology strongly impacts the synchronizablity of the system, and the analysis of their relationship remains an open challenge. We know that the eigenvalue distribution determines a network's synchronizability, but analytical expressions that connect network topology and all relevant eigenvalues (e.g., the extreme values) remain elusive.
Here, we accurately determine its synchronizability by proposing an analytical method to estimate the extreme eigenvalues using perturbation theory. Our analytical method exposes the role global and local topology combine to influence synchronizability. We show that the smallest non-zero eigenvalue which determines synchronizability is estimated by the smallest degree augmented by the inverse degree difference in the least connected nodes. From this, we can conclude that there exists a clear negative relationship between the smallest non-zero eigenvalue and the local assortativity of nodes with smallest degree values. We validate the accuracy of our framework within the setting of a Scale-free (SF) network and can be driven by commonly used ODEs (e.g., 3-dimensional Rosler or Lorenz dynamics). From the results, we demonstrate that the synchronizability of the network can be tuned by rewiring the connections of these particular nodes while maintaining the general degree profile of the network.
△ Less
Submitted 23 November, 2021;
originally announced November 2021.
-
Regions of Attraction Estimation using Level SetMethod for Complex Network System
Authors:
Mengbang Zou,
Yu Huang,
Weisi Guo
Abstract:
Many complex engineering systems network together functional elements and balance demand loads (e.g.information on data networks, electric power on grids). This allows load spikes to be shifted and avoid a local overload. In mobile wireless networks, base stations(BSs) receive data demand and shift high loads to neighbouring BSs to avoid the outage. The stability of cascade load balancing is impor…
▽ More
Many complex engineering systems network together functional elements and balance demand loads (e.g.information on data networks, electric power on grids). This allows load spikes to be shifted and avoid a local overload. In mobile wireless networks, base stations(BSs) receive data demand and shift high loads to neighbouring BSs to avoid the outage. The stability of cascade load balancing is important because unstable networks can cause high inefficiency. The research challenge is to prove the stability conditions for any arbitrarily large, complex, and dynamic network topology, and for any balancing dynamic function. Our previous work has proven the conditions for stability for stationary networks near equilibrium for any load balancing dynamic and topology. Most current analyses in dynamic complex networks linearize the system around the fixed equilibrium solutions. This approach is insufficient for dynamic networks with changing equilibrium and estimating the Region of Attraction(ROA) is needed. The novelty of this paper is that we compress this high-dimensional system and use Level Set Methods (LSM) to estimate the ROA. Our results show how we can control the ROA via network topology (local degree control) as a way to configure the mobility of transceivers to ensure the preservation of stable load balancing.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
(α, β)-Modules in Graphs
Authors:
Michel Habib,
Lalla Mouatadid,
Eric Sopena,
Mengchuan Zou
Abstract:
Modular Decomposition focuses on repeatedly identifying a module M (a collection of vertices that shares exactly the same neighbourhood outside of M) and collapsing it into a single vertex. This notion of exactitude of neighbourhood is very strict, especially when dealing with real world graphs. We study new ways to relax this exactitude condition. However, generalizing modular decomposition is fa…
▽ More
Modular Decomposition focuses on repeatedly identifying a module M (a collection of vertices that shares exactly the same neighbourhood outside of M) and collapsing it into a single vertex. This notion of exactitude of neighbourhood is very strict, especially when dealing with real world graphs. We study new ways to relax this exactitude condition. However, generalizing modular decomposition is far from obvious. Most of the previous proposals lose algebraic properties of modules and thus most of the nice algorithmic consequences. We introduce the notion of an (α, β)-module, a relaxation that allows a bounded number of errors in each node and maintains some of the algebraic structure. It leads to a new combinatorial decomposition with interesting properties. Among the main results in this work, we show that minimal (α, β)-modules can be computed in polynomial time, and that every graph admits an (α,β)-modular decomposition tree, thus generalizing Gallai's Theorem (which corresponds to the case for α = β = 0). Unfortunately we give evidence that computing such a decomposition tree can be difficult.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
Field Test of Twin-Field Quantum Key Distribution through Sending-or-Not-Sending over 428 km
Authors:
Hui Liu,
Cong Jiang,
Hao-Tao Zhu,
Mi Zou,
Zong-Wen Yu,
Xiao-Long Hu,
Hai Xu,
Shizhao Ma,
Zhiyong Han,
Jiu-Peng Chen,
Yunqi Dai,
Shi-Biao Tang,
Weijun Zhang,
Hao Li,
Lixing You,
Zhen Wang,
Fei Zhou,
Qiang Zhang,
Xiang-Bin Wang,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
Quantum key distribution endows people with information-theoretical security in communications. Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because of its outstanding key rates over long distances. Recently, several demonstrations of TF-QKD have been realized. Nevertheless, those experiments are implemented in the laboratory, remaining a critical question abou…
▽ More
Quantum key distribution endows people with information-theoretical security in communications. Twin-field quantum key distribution (TF-QKD) has attracted considerable attention because of its outstanding key rates over long distances. Recently, several demonstrations of TF-QKD have been realized. Nevertheless, those experiments are implemented in the laboratory, remaining a critical question about whether the TF-QKD is feasible in real-world circumstances. Here, by adopting the sending-or-not-sending twin-field QKD (SNS-TF-QKD) with the method of actively odd parity pairing (AOPP), we demonstrate a field-test QKD over 428~km deployed commercial fiber and two users are physically separated by about 300~km in a straight line. To this end, we explicitly measure the relevant properties of the deployed fiber and develop a carefully designed system with high stability. The secure key rate we achieved breaks the absolute key rate limit of repeater-less QKD. The result provides a new distance record for the field test of both TF-QKD and all types of fiber-based QKD systems. Our work bridges the gap of QKD between laboratory demonstrations and practical applications, and paves the way for intercity QKD network with high-speed and measurement-device-independent security.
△ Less
Submitted 1 January, 2021;
originally announced January 2021.
-
Statistical Analysis of Signal-Dependent Noise: Application in Blind Localization of Image Splicing Forgery
Authors:
Mian Zou,
Heng Yao,
Chuan Qin,
Xinpeng Zhang
Abstract:
Visual noise is often regarded as a disturbance in image quality, whereas it can also provide a crucial clue for image-based forensic tasks. Conventionally, noise is assumed to comprise an additive Gaussian model to be estimated and then used to reveal anomalies. However, for real sensor noise, it should be modeled as signal-dependent noise (SDN). In this work, we apply SDN to splicing forgery loc…
▽ More
Visual noise is often regarded as a disturbance in image quality, whereas it can also provide a crucial clue for image-based forensic tasks. Conventionally, noise is assumed to comprise an additive Gaussian model to be estimated and then used to reveal anomalies. However, for real sensor noise, it should be modeled as signal-dependent noise (SDN). In this work, we apply SDN to splicing forgery localization tasks. Through statistical analysis of the SDN model, we assume that noise can be modeled as a Gaussian approximation for a certain brightness and propose a likelihood model for a noise level function. By building a maximum a posterior Markov random field (MAP-MRF) framework, we exploit the likelihood of noise to reveal the alien region of spliced objects, with a probability combination refinement strategy. To ensure a completely blind detection, an iterative alternating method is adopted to estimate the MRF parameters. Experimental results demonstrate that our method is effective and provides a comparative localization performance.
△ Less
Submitted 2 November, 2020; v1 submitted 30 October, 2020;
originally announced October 2020.
-
Uncertainty Quantification of Multi-Scale Resilience in Nonlinear Complex Networks using Arbitrary Polynomial Chaos
Authors:
Mengbang Zou,
Luca Zanotti Fragonara,
Weisi Guo
Abstract:
Resilience characterizes a system's ability to retain its original function when perturbations happen. In the past years our attention mainly focused on small-scale resilience, yet our understanding of resilience in large-scale network considering interactions between components is limited. Even though, recent research in macro and micro resilience pattern has developed analytical tools to analyze…
▽ More
Resilience characterizes a system's ability to retain its original function when perturbations happen. In the past years our attention mainly focused on small-scale resilience, yet our understanding of resilience in large-scale network considering interactions between components is limited. Even though, recent research in macro and micro resilience pattern has developed analytical tools to analyze the relationship between topology and dynamics across network scales. The effect of uncertainty in a large-scale networked system is not clear, especially when uncertainties cascade between connected nodes. In order to quantify resilience uncertainty across the network resolutions (macro to micro),an arbitrary polynomial chaos (aPC) expansion method is developed in this paper to estimate the resilience subject to parameter uncertainties with arbitrary distributions. For the first time and of particular importance, is our ability to identify the probability of a node in losing its resilience and how the different model parameters contribute to this risk. We test this using a generic networked bi-stable system and this will aid practitioners to both understand macro-scale behaviour and make micro-scale interventions.
△ Less
Submitted 10 October, 2020; v1 submitted 16 September, 2020;
originally announced September 2020.
-
Uncertainty of Resilience in Complex Networks with Nonlinear Dynamics
Authors:
Giannis Moutsinas,
Mengbang Zou,
Weisi Guo
Abstract:
Resilience is a system's ability to maintain its function when perturbations and errors occur. Whilst we understand low-dimensional networked systems' behavior well, our understanding of systems consisting of a large number of components is limited. Recent research in predicting the network level resilience pattern has advanced our understanding of the coupling relationship between global network…
▽ More
Resilience is a system's ability to maintain its function when perturbations and errors occur. Whilst we understand low-dimensional networked systems' behavior well, our understanding of systems consisting of a large number of components is limited. Recent research in predicting the network level resilience pattern has advanced our understanding of the coupling relationship between global network topology and local nonlinear component dynamics. However, when there is uncertainty in the model parameters, our understanding of how this translates to uncertainty in resilience is unclear for a large-scale networked system. Here we develop a polynomial chaos expansion method to estimate the resilience for a wide range of uncertainty distributions. By applying this method to case studies, we not only reveal the general resilience distribution with respect to the topology and dynamics sub-models, but also identify critical aspects to inform better monitoring to reduce uncertainty.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Pairing symmetry in monolayer of orthorhombic CoSb
Authors:
Tian-Zhong Yuan,
Mu-Yuan Zou,
Wen-Tao Jin,
Xin-Yuan Wei,
Xu-Guang Xu,
Wei Li
Abstract:
Ferromagnetism and superconductivity are generally considered to be antagonistic phenomena in condensed matter physics. Here, we theoretically study the interplay between the ferromagnetic and superconducting orders in a recent discovered monolayered CoSb superconductor with an orthorhombic symmetry and net magnetization, and demonstrate the pairing symmetry of CoSb as a candidate of non-unitary s…
▽ More
Ferromagnetism and superconductivity are generally considered to be antagonistic phenomena in condensed matter physics. Here, we theoretically study the interplay between the ferromagnetic and superconducting orders in a recent discovered monolayered CoSb superconductor with an orthorhombic symmetry and net magnetization, and demonstrate the pairing symmetry of CoSb as a candidate of non-unitary superconductor with time-reversal symmetry breaking. By performing the group theory analysis and the first-principles calculations, the superconducting order parameter is suggested to be a triplet pairing with the irreducible representation of $^3B_{2u}$, which displays intriguing nodal points and non-zero periodic modulation of Cooper pair spin polarization on the Fermi surface topologies. These findings not only provide a significant theoretical insight into the coexistence of superconductivity and ferromagnetism, but also reveal the exotic spin polarized Cooper pairing driven by ferromagnetic spin fluctuations in a triplet superconductor.
△ Less
Submitted 5 February, 2021; v1 submitted 21 April, 2020;
originally announced April 2020.
-
A graph inequality on the common neighbourhood
Authors:
Xiaomin Chen,
Fenglin Huang,
Shuhan Zhou,
Mingxuan Zou,
Junchi Zuo
Abstract:
In this note we prove a graph inequality based on the sizes of the common neighbourhoods. We also characterize the extremal graphs that achieve the equality.
The result was first discovered as a consequence of the classical Forster's theorem in electric networks. We also present a short combinatorial proof that was inspired by a similar inequality related to the celebrated Turán's theorem.
In this note we prove a graph inequality based on the sizes of the common neighbourhoods. We also characterize the extremal graphs that achieve the equality.
The result was first discovered as a consequence of the classical Forster's theorem in electric networks. We also present a short combinatorial proof that was inspired by a similar inequality related to the celebrated Turán's theorem.
△ Less
Submitted 1 December, 2019;
originally announced December 2019.
-
Evidence the ferromagnetic order on CoSb layer of LaCoSb$_2$
Authors:
Muyuan Zou,
Jianan Chu,
Hui Zhang,
Tianzhong Yuan,
Peng Cheng,
Wentao Jin,
Da Jiang,
Xuguang Xu,
Wenjie Yu,
Zhenghua An,
Xinyuan Wei,
Gang Mu,
Wei Li
Abstract:
The emergence of unconventional superconductivity is generally considered to be related to spin fluctuations. Unveiling the intriguing behaviors of spin fluctuations in parent compounds with layered transition-metal ions may shed light on the search for exotic unconventional superconductors. Here, based on the framework of the first-principles calculations, we theoretically propose that LaCoSb…
▽ More
The emergence of unconventional superconductivity is generally considered to be related to spin fluctuations. Unveiling the intriguing behaviors of spin fluctuations in parent compounds with layered transition-metal ions may shed light on the search for exotic unconventional superconductors. Here, based on the framework of the first-principles calculations, we theoretically propose that LaCoSb$_2$ is a weak antiferromagnetic layered metal with an in-plane ferromagnetic moment of 0.88 $μ_B$ at the Co sites, as a candidate parent compound of the cobalt-based superconductors. Importantly, this theoretical finding is experimentally supported by our magnetization measurements on polycrystalline samples of LaCo$_{0.78}$Sb$_2$. Following the symmetry analysis, we suggest a possible $p$-wave superconductivity hosted in doped LaCoSb$_2$ emerging at the verge of ferromagnetic spin fluctuations, which implies potential applications in topological quantum computing in future.
△ Less
Submitted 27 April, 2020; v1 submitted 23 November, 2019;
originally announced November 2019.
-
Surpassing the rate-transmittance linear bound of quantum key distribution
Authors:
Xiao-Tian Fang,
Pei Zeng,
Hui Liu,
Mi Zou,
Weijie Wu,
Yan-Lin Tang,
Ying-Jie Sheng,
Yao Xiang,
Weijun Zhang,
Hao Li,
Zhen Wang,
Lixing You,
Ming-Jun Li,
Hao Chen,
Yu-Ao Chen,
Qiang Zhang,
Cheng-Zhi Peng,
Xiongfeng Ma,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
Quantum key distribution (QKD offers a long-term solution to establish information-theoretically secure keys between two distant users. In practice, with a careful characterization of quantum sources and the decoy-state method, measure-device-independent quantum key distribution (MDI-QKD) provides secure key distribution. While short-distance fibre-based QKD has already been available for real-lif…
▽ More
Quantum key distribution (QKD offers a long-term solution to establish information-theoretically secure keys between two distant users. In practice, with a careful characterization of quantum sources and the decoy-state method, measure-device-independent quantum key distribution (MDI-QKD) provides secure key distribution. While short-distance fibre-based QKD has already been available for real-life implementation, the bottleneck of practical QKD lies on the limited transmission distance. Due to photon losses in transmission, it was believed that the key generation rate is bounded by a linear function of the channel transmittance, $O(η)$, without a quantum repeater, which puts an upper bound on the maximal secure transmission distance. Interestingly, a new phase-encoding MDI-QKD scheme, named twin-field QKD, has been suggested to beat the linear bound, while another variant, named phase-matching quantum key distribution (PM-QKD), has been proven to have a quadratic key-rate improvement, $O(\sqrtη)$. In reality, however, the intrinsic optical mode mismatch of independent lasers, accompanied by phase fluctuation and drift, impedes the successful experimental implementation of the new schemes. Here, we solve this problem with the assistance of the laser injection technique and the phase post-compensation method. In the experiment, the key rate surpasses the linear key-rate bound via 302 km and 402 km commercial-fibre channels, achieving a key rate over 4 orders of magnitude higher than the existing results in literature. Furthermore, with a 502 km ultralow-loss fibre, our system yields a secret key rate of 0.118 bps. We expect this new type of QKD schemes to become a new standard for future QKD.
△ Less
Submitted 4 August, 2019;
originally announced August 2019.
-
An Experimentally Verified Approach to non-Entanglement-Breaking Channel Certification
Authors:
Yingqiu Mao,
Yi-Zheng Zhen,
Hui Liu,
Mi Zou,
Qi-Jie Tang,
Si-Jie Zhang,
Jian Wang,
Hao Liang,
Weijun Zhang,
Hao Li,
Lixing You,
Zhen Wang,
Li Li,
Nai-Le Liu,
Kai Chen,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
Ensuring the non-entanglement-breaking (non-EB) property of quantum channels is crucial for the effective distribution and storage of quantum states. However, a practical method for direct and accurate certification of the non-EB feature is highly desirable. Here, we propose and verify a realistic source based measurement device independent certification of non-EB channels. Our method is resilient…
▽ More
Ensuring the non-entanglement-breaking (non-EB) property of quantum channels is crucial for the effective distribution and storage of quantum states. However, a practical method for direct and accurate certification of the non-EB feature is highly desirable. Here, we propose and verify a realistic source based measurement device independent certification of non-EB channels. Our method is resilient to repercussions on the certification from experimental conditions, such as multiphotons and imperfect state preparation, and can be implemented with information incomplete set. We achieve good agreement between experimental outcomes and theoretical predictions, which is validated by the expected results of the ideal semi-quantum signaling game, and accurately certify the non-EB channels. Furthermore, our approach is highly robust to effects from noise. Therefore, the proposed approach can be expected to play a significant role in the design and evaluation of realistic quantum channels.
△ Less
Submitted 26 November, 2019; v1 submitted 24 June, 2019;
originally announced June 2019.
-
Experimental 4-intensity decoy-state quantum key distribution with asymmetric basis detector efficiency
Authors:
Hui Liu,
Zong-Wen Yu,
Mi Zou,
Yan-Lin Tang,
Yong Zhao,
Jun Zhang,
Xiang-Bin Wang,
Teng-Yun Chen,
Jian-Wei Pan
Abstract:
The decoy-state method has been developed rapidly in quantum key distribution (QKD) since it is immune to photon-number splitting attacks. However, two basis detector efficiency asymmetry, which exists in realistic scenarios, has been ignored in the prior results. By using the recent 4-intensity decoy-state optimization protocol, we report the first implementation of high-rate QKD with asymmetric…
▽ More
The decoy-state method has been developed rapidly in quantum key distribution (QKD) since it is immune to photon-number splitting attacks. However, two basis detector efficiency asymmetry, which exists in realistic scenarios, has been ignored in the prior results. By using the recent 4-intensity decoy-state optimization protocol, we report the first implementation of high-rate QKD with asymmetric basis detector efficiency, demonstrating 1.9 to 33.2 times higher key rate than previous protocols in the situation of large basis detector efficiency asymmetry. The results ruled out an implicitly assumption in QKD that the efficiency of Z basis and X basis are restricted to be same. This work paves the way towards a more practical QKD setting.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Network Phenotyping for Network Traffic Classification and Anomaly Detection
Authors:
Minhui Zou,
Chengliang Wang,
Fangyu Li,
WenZhan Song
Abstract:
This paper proposes to develop a network phenotyping mechanism based on network resource usage analysis and identify abnormal network traffic. The network phenotyping may use different metrics in the cyber physical system (CPS), including resource and network usage monitoring, physical state estimation. The set of devices will collectively decide a holistic view of the entire system through advanc…
▽ More
This paper proposes to develop a network phenotyping mechanism based on network resource usage analysis and identify abnormal network traffic. The network phenotyping may use different metrics in the cyber physical system (CPS), including resource and network usage monitoring, physical state estimation. The set of devices will collectively decide a holistic view of the entire system through advanced image processing and machine learning methods. In this paper, we choose the network traffic pattern as a study case to demonstrate the effectiveness of the proposed method, while the methodology may similarly apply to classification and anomaly detection based on other resource metrics. We apply image processing and machine learning on the network resource usage to extract and recognize communication patterns. The phenotype method is experimented on four real-world decentralized applications. With proper length of sampled continuous network resource usage, the overall recognition accuracy is about 99%. Additionally, the recognition error is used to detect the anomaly network traffic. We simulate the anomaly network resource usage that equals to 10%, 20% and 30% of the normal network resource usage. The experiment results show the proposed anomaly detection method is efficient in detecting each intensity of anomaly network resource usage.
△ Less
Submitted 5 March, 2018;
originally announced March 2018.
-
PoTrojan: powerful neural-level trojan designs in deep learning models
Authors:
Minhui Zou,
Yang Shi,
Chengliang Wang,
Fangyu Li,
WenZhan Song,
Yu Wang
Abstract:
With the popularity of deep learning (DL), artificial intelligence (AI) has been applied in many areas of human life. Neural network or artificial neural network (NN), the main technique behind DL, has been extensively studied to facilitate computer vision and natural language recognition. However, the more we rely on information technology, the more vulnerable we are. That is, malicious NNs could…
▽ More
With the popularity of deep learning (DL), artificial intelligence (AI) has been applied in many areas of human life. Neural network or artificial neural network (NN), the main technique behind DL, has been extensively studied to facilitate computer vision and natural language recognition. However, the more we rely on information technology, the more vulnerable we are. That is, malicious NNs could bring huge threat in the so-called coming AI era. In this paper, for the first time in the literature, we propose a novel approach to design and insert powerful neural-level trojans or PoTrojan in pre-trained NN models. Most of the time, PoTrojans remain inactive, not affecting the normal functions of their host NN models. PoTrojans could only be triggered in very rare conditions. Once activated, however, the PoTrojans could cause the host NN models to malfunction, either falsely predicting or classifying, which is a significant threat to human society of the AI era. We would explain the principles of PoTrojans and the easiness of designing and inserting them in pre-trained deep learning models. PoTrojans doesn't modify the existing architecture or parameters of the pre-trained models, without re-training. Hence, the proposed method is very efficient.
△ Less
Submitted 2 December, 2019; v1 submitted 8 February, 2018;
originally announced February 2018.
-
Orthogonal abelian Cartan subalgebra decomposition of $\mathfrak{sl}_n$ over a finite commutative ring
Authors:
Songpon Sriwongsa,
Yi Ming Zou
Abstract:
Orthogonal decomposition of the special linear Lie algebra over the complex numbers was studied in the early 1980s and attracted further attentions in the past decade due to its application in quantum information theory. In this paper, we study this decomposition problem of the special linear Lie algebra over a finite commutative ring with identity.
Orthogonal decomposition of the special linear Lie algebra over the complex numbers was studied in the early 1980s and attracted further attentions in the past decade due to its application in quantum information theory. In this paper, we study this decomposition problem of the special linear Lie algebra over a finite commutative ring with identity.
△ Less
Submitted 6 February, 2018;
originally announced February 2018.