-
Influences of Dielectric Constant and Scan Rate to Hysteresis Effect in Perovskite Solar Cell: Simulation and Experimental Analyses
Authors:
Jun-Yu Huang,
You-Wei Yang,
Wei-Hsuan Hsu,
En-Wen Chang,
Mei-Hsin Chen,
Yuh-Renn Wu
Abstract:
In this work, perovskite solar cells (PSCs) with different transport layers were fabricated to understand the hysteresis phenomenon under a series of scan rates. The experimental results show that the hysteresis phenomenon would be affected by the dielectric constant of transport layers and scan rate significantly. To explain this, a modified Poisson and drift-diffusion solver coupled with a fully…
▽ More
In this work, perovskite solar cells (PSCs) with different transport layers were fabricated to understand the hysteresis phenomenon under a series of scan rates. The experimental results show that the hysteresis phenomenon would be affected by the dielectric constant of transport layers and scan rate significantly. To explain this, a modified Poisson and drift-diffusion solver coupled with a fully time-dependent ion migration model is developed to analyze how the ion migration affects the performance and hysteresis of PSCs. The simulation model was optimized for carrier transportation of organic materials, which can simulate the organic transport layer correctly without using heavy do** in simulating the organic transport layer. The modeling results show that the most crucial factor in the hysteresis behavior is the built-in electric field of the perovskite. The non-linear hysteresis curves are demonstrated under different scan rates, and the mechanism of the hysteresis behavior is explained. The findings reveal why the change in hysteresis degree with scan rate is Gaussian shaped rather than monotonic. Additionally, other factors contributing to the degree of hysteresis are determined to be the degree of degradation in the perovskite material, the quality of the perovskite crystal, and the materials of the transport layer, which corresponds to the total ion density, carrier lifetime of perovskite, and the dielectric constant of the transport layer, respectively. Finally, it was found that the dielectric constant of the transport layer is a key factor affecting hysteresis in perovskite solar cells; a lower dielectric constant corresponds to a higher electric field of the transport layer. Hence, if the electric field of the perovskite material is small, the degree of hysteresis is small and vice versa.
△ Less
Submitted 21 May, 2022; v1 submitted 23 June, 2021;
originally announced June 2021.
-
Robust Navigation for Racing Drones based on Imitation Learning and Modularization
Authors:
Tianqi Wang,
Dong Eui Chang
Abstract:
This paper presents a vision-based modularized drone racing navigation system that uses a customized convolutional neural network (CNN) for the perception module to produce high-level navigation commands and then leverages a state-of-the-art planner and controller to generate low-level control commands, thus exploiting the advantages of both data-based and model-based approaches. Unlike the state-…
▽ More
This paper presents a vision-based modularized drone racing navigation system that uses a customized convolutional neural network (CNN) for the perception module to produce high-level navigation commands and then leverages a state-of-the-art planner and controller to generate low-level control commands, thus exploiting the advantages of both data-based and model-based approaches. Unlike the state-of-the-art method which only takes the current camera image as the CNN input, we further add the latest three drone states as part of the inputs. Our method outperforms the state-of-the-art method in various track layouts and offers two switchable navigation behaviors with a single trained network. The CNN-based perception module is trained to imitate an expert policy that automatically generates ground truth navigation commands based on the pre-computed global trajectories. Owing to the extensive randomization and our modified dataset aggregation (DAgger) policy during data collection, our navigation system, which is purely trained in simulation with synthetic textures, successfully operates in environments with randomly-chosen photorealistic textures without further fine-tuning.
△ Less
Submitted 26 May, 2021;
originally announced May 2021.
-
Irreducibly $SU(2)$-covariant quantum channels of low rank
Authors:
Euijung Chang,
Jaeyoung Kim,
Hyesun Kwak,
Hun Hee Lee,
Sang-Gyun Youn
Abstract:
We investigate information theoretic properties of low rank (less than or equal to 3) quantum channels with $SU(2)$-symmetry, where we have a complete description. We prove that PPT property coincides with entanglement-breaking property and that degradability seldomly holds in this class. In connection with these results we will demonstrate how we can compute Holevo and coherent information of tho…
▽ More
We investigate information theoretic properties of low rank (less than or equal to 3) quantum channels with $SU(2)$-symmetry, where we have a complete description. We prove that PPT property coincides with entanglement-breaking property and that degradability seldomly holds in this class. In connection with these results we will demonstrate how we can compute Holevo and coherent information of those channels. In particular, we exhibit a strong form of additivity violation of coherent information, which resembles the superactivation of coherent information of depolarizing channels.
△ Less
Submitted 3 May, 2021;
originally announced May 2021.
-
Demanded Abstract Interpretation (Extended Version)
Authors:
Benno Stein,
Bor-Yuh Evan Chang,
Manu Sridharan
Abstract:
We consider the problem of making expressive static analyzers interactive. Formal static analysis is seeing increasingly widespread adoption as a tool for verification and bug-finding, but even with powerful cloud infrastructure it can take minutes or hours to get batch analysis results after a code change. While existing techniques offer some demand-driven or incremental aspects for certain class…
▽ More
We consider the problem of making expressive static analyzers interactive. Formal static analysis is seeing increasingly widespread adoption as a tool for verification and bug-finding, but even with powerful cloud infrastructure it can take minutes or hours to get batch analysis results after a code change. While existing techniques offer some demand-driven or incremental aspects for certain classes of analysis, the fundamental challenge we tackle is doing both for arbitrary abstract interpreters.
Our technique, demanded abstract interpretation, lifts program syntax and analysis state to a dynamically evolving graph structure, in which program edits, client-issued queries, and evaluation of abstract semantics are all treated uniformly. The key difficulty addressed by our approach is the application of general incremental computation techniques to the complex, cyclic dependency structure induced by abstract interpretation of loops with widening operators. We prove that desirable abstract interpretation meta-properties, including soundness and termination, are preserved in our approach, and that demanded analysis results are equal to those computed by a batch abstract interpretation. Experimental results suggest promise for a prototype demanded abstract interpretation framework: by combining incremental and demand-driven techniques, our framework consistently delivers analysis results at interactive speeds, answering 95% of queries within 1.2 seconds.
△ Less
Submitted 6 April, 2021; v1 submitted 2 April, 2021;
originally announced April 2021.
-
Large Scale Image Completion via Co-Modulated Generative Adversarial Networks
Authors:
Shengyu Zhao,
Jonathan Cui,
Yilun Sheng,
Yue Dong,
Xiao Liang,
Eric I Chang,
Yan Xu
Abstract:
Numerous task-specific variants of conditional generative adversarial networks have been developed for image completion. Yet, a serious limitation remains that all existing algorithms tend to fail when handling large-scale missing regions. To overcome this challenge, we propose a generic new approach that bridges the gap between image-conditional and recent modulated unconditional generative archi…
▽ More
Numerous task-specific variants of conditional generative adversarial networks have been developed for image completion. Yet, a serious limitation remains that all existing algorithms tend to fail when handling large-scale missing regions. To overcome this challenge, we propose a generic new approach that bridges the gap between image-conditional and recent modulated unconditional generative architectures via co-modulation of both conditional and stochastic style representations. Also, due to the lack of good quantitative metrics for image completion, we propose the new Paired/Unpaired Inception Discriminative Score (P-IDS/U-IDS), which robustly measures the perceptual fidelity of inpainted images compared to real images via linear separability in a feature space. Experiments demonstrate superior performance in terms of both quality and diversity over state-of-the-art methods in free-form image completion and easy generalization to image-to-image translation. Code is available at https://github.com/zsyzzsoft/co-mod-gan.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
The axial charge of the triton from lattice QCD
Authors:
Assumpta Parreño,
Phiala E. Shanahan,
Michael L. Wagman,
Frank Winter,
Emmanuel Chang,
William Detmold,
Marc Illa
Abstract:
The axial charge of the triton is investigated using lattice quantum chromodynamics (QCD). Extending previous work at heavier quark masses, calculations are performed using three ensembles of gauge field configurations generated with quark masses corresponding to a pion mass of 450 MeV. Finite-volume energy levels for the triton, as well as for the deuteron and diproton systems, are extracted from…
▽ More
The axial charge of the triton is investigated using lattice quantum chromodynamics (QCD). Extending previous work at heavier quark masses, calculations are performed using three ensembles of gauge field configurations generated with quark masses corresponding to a pion mass of 450 MeV. Finite-volume energy levels for the triton, as well as for the deuteron and diproton systems, are extracted from analysis of correlation functions computed on these ensembles, and the corresponding energies are extrapolated to infinite volume using finite-volume pionless effective field theory (FVEFT). It is found with high likelihood that there is a compact bound state with the quantum numbers of the triton at these quark masses. The axial current matrix elements are computed using background field techniques on one of the ensembles and FVEFT is again used to determine the axial charge of the proton and triton. A simple quark mass extrapolation of these results and earlier calculations at heavier quark masses leads to a value of the ratio of the triton to proton axial charges at the physical quark masses of $g_A^{^{3}{\rm H}}/g_A^p=0.91\substack{+0.07 \\ -0.09}$. This result is consistent with the ratio determined from experiment and prefers values less than unity (in which case the triton axial charge would be unmodified from that of the proton), thereby demonstrating that QCD can explain the modification of the axial charge of the triton.
△ Less
Submitted 7 February, 2021;
originally announced February 2021.
-
Neural Data-to-Text Generation with LM-based Text Augmentation
Authors:
Ernie Chang,
Xiaoyu Shen,
Dawei Zhu,
Vera Demberg,
Hui Su
Abstract:
For many new application domains for data-to-text generation, the main obstacle in training neural models consists of a lack of training data. While usually large numbers of instances are available on the data side, often only very few text samples are available. To address this problem, we here propose a novel few-shot approach for this setting. Our approach automatically augments the data availa…
▽ More
For many new application domains for data-to-text generation, the main obstacle in training neural models consists of a lack of training data. While usually large numbers of instances are available on the data side, often only very few text samples are available. To address this problem, we here propose a novel few-shot approach for this setting. Our approach automatically augments the data available for training by (i) generating new text samples based on replacing specific values by alternative ones from the same category, (ii) generating new text samples based on GPT-2, and (iii) proposing an automatic method for pairing the new text samples with data samples. As the text augmentation can introduce noise to the training data, we use cycle consistency as an objective, in order to make sure that a given data sample can be correctly reconstructed after having been formulated as text (and that text samples can be reconstructed from data). On both the E2E and WebNLG benchmarks, we show that this weakly supervised training paradigm is able to outperform fully supervised seq2seq models with less than 10% annotations. By utilizing all annotated data, our model can boost the performance of a standard seq2seq model by over 5 BLEU points, establishing a new state-of-the-art on both datasets.
△ Less
Submitted 6 February, 2021;
originally announced February 2021.
-
Does the Order of Training Samples Matter? Improving Neural Data-to-Text Generation with Curriculum Learning
Authors:
Ernie Chang,
Hui-Syuan Yeh,
Vera Demberg
Abstract:
Recent advancements in data-to-text generation largely take on the form of neural end-to-end systems. Efforts have been dedicated to improving text generation systems by changing the order of training samples in a process known as curriculum learning. Past research on sequence-to-sequence learning showed that curriculum learning helps to improve both the performance and convergence speed. In this…
▽ More
Recent advancements in data-to-text generation largely take on the form of neural end-to-end systems. Efforts have been dedicated to improving text generation systems by changing the order of training samples in a process known as curriculum learning. Past research on sequence-to-sequence learning showed that curriculum learning helps to improve both the performance and convergence speed. In this work, we delve into the same idea surrounding the training samples consisting of structured data and text pairs, where at each update, the curriculum framework selects training samples based on the model's competence. Specifically, we experiment with various difficulty metrics and put forward a soft edit distance metric for ranking training samples. Our benchmarks show faster convergence speed where training time is reduced by 38.7% and performance is boosted by 4.84 BLEU.
△ Less
Submitted 6 February, 2021;
originally announced February 2021.
-
Jointly Improving Language Understanding and Generation with Quality-Weighted Weak Supervision of Automatic Labeling
Authors:
Ernie Chang,
Vera Demberg,
Alex Marin
Abstract:
Neural natural language generation (NLG) and understanding (NLU) models are data-hungry and require massive amounts of annotated data to be competitive. Recent frameworks address this bottleneck with generative models that synthesize weak labels at scale, where a small amount of training labels are expert-curated and the rest of the data is automatically annotated. We follow that approach, by auto…
▽ More
Neural natural language generation (NLG) and understanding (NLU) models are data-hungry and require massive amounts of annotated data to be competitive. Recent frameworks address this bottleneck with generative models that synthesize weak labels at scale, where a small amount of training labels are expert-curated and the rest of the data is automatically annotated. We follow that approach, by automatically constructing a large-scale weakly-labeled data with a fine-tuned GPT-2, and employ a semi-supervised framework to jointly train the NLG and NLU models. The proposed framework adapts the parameter updates to the models according to the estimated label-quality. On both the E2E and Weather benchmarks, we show that this weakly supervised training paradigm is an effective approach under low resource scenarios and outperforming benchmark systems on both datasets when 100% of training data is used.
△ Less
Submitted 6 February, 2021;
originally announced February 2021.
-
Superradiant detection of microscopic optical dipolar interactions
Authors:
Ling**g Ji,
Yizun He,
Qingnan Cai,
Zhening Fang,
Yuzhuo Wang,
Liyang Qiu,
Lei Zhou,
Saijun Wu,
Stefano Grava,
Darrick E. Chang
Abstract:
The interaction between light and cold atoms is a complex phenomenon potentially featuring many-body resonant dipole interactions. A major obstacle toward exploring these quantum resources of the system is macroscopic light propagation effects, which not only limit the available time for the microscopic correlations to locally build up, but also create a directional, superradiant emission backgrou…
▽ More
The interaction between light and cold atoms is a complex phenomenon potentially featuring many-body resonant dipole interactions. A major obstacle toward exploring these quantum resources of the system is macroscopic light propagation effects, which not only limit the available time for the microscopic correlations to locally build up, but also create a directional, superradiant emission background whose variations can overwhelm the microscopic effects. In this Letter, we demonstrate a method to perform ``background-free'' detection of the microscopic optical dynamics in a laser-cooled atomic ensemble. This is made possible by transiently suppressing the macroscopic optical propagation over a substantial time, before a recall of superradiance that imprints the effect of the accumulated microscopic dynamics into an efficiently detectable outgoing field. We apply this technique to unveil and precisely characterize a density-dependent, microscopic dipolar dephasing effect that generally limits the lifetime of optical spin-wave order in ensemble-based atom-light interfaces.
△ Less
Submitted 12 October, 2023; v1 submitted 26 January, 2021;
originally announced January 2021.
-
Quantum nonlinear optics based on two-dimensional Rydberg atom arrays
Authors:
Mariona Moreno-Cardoner,
Daniel Goncalves,
Darrick E. Chang
Abstract:
Here, we explore the combination of sub-wavelength, two-dimensional atomic arrays and Rydberg interactions as a powerful platform to realize strong, coherent interactions between individual photons with high fidelity. In particular, the spatial ordering of the atoms guarantees efficient atom-light interactions without the possibility of scattering light into unwanted directions, for example, allow…
▽ More
Here, we explore the combination of sub-wavelength, two-dimensional atomic arrays and Rydberg interactions as a powerful platform to realize strong, coherent interactions between individual photons with high fidelity. In particular, the spatial ordering of the atoms guarantees efficient atom-light interactions without the possibility of scattering light into unwanted directions, for example, allowing the array to act as a perfect mirror for individual photons. In turn, Rydberg interactions enable single photons to alter the optical response of the array within a potentially large blockade radius $R_b$, which can effectively punch a large "hole" for subsequent photons. We show that such a system enables a coherent photon-photon gate or switch, with an error scaling $\sim R_b^{-4}$ that is significantly better than the best known scaling in a disordered ensemble. We also investigate the optical properties of the system in the limit of strong input intensities. Although this a priori represents a complicated, many-body quantum driven dissipative system, we find that the behavior can be captured well by a semi-classical model based on holes punched in a classical mirror.
△ Less
Submitted 6 January, 2021;
originally announced January 2021.
-
The Adaptive Dynamic Programming Toolbox
Authors:
Xiaowei Xing,
Dong Eui Chang
Abstract:
The paper develops the Adaptive Dynamic Programming Toolbox (ADPT), which solves optimal control problems for continuous-time nonlinear systems. Based on the adaptive dynamic programming technique, the ADPT computes optimal feedback controls from the system dynamics in the model-based working mode, or from measurements of trajectories of the system in the model-free working mode without the requir…
▽ More
The paper develops the Adaptive Dynamic Programming Toolbox (ADPT), which solves optimal control problems for continuous-time nonlinear systems. Based on the adaptive dynamic programming technique, the ADPT computes optimal feedback controls from the system dynamics in the model-based working mode, or from measurements of trajectories of the system in the model-free working mode without the requirement of knowledge of the system model. Multiple options are provided such that the ADPT can accommodate various customized circumstances. Compared to other popular software toolboxes for optimal control, the ADPT enjoys its computational precision and speed, which is illustrated with its applications to a satellite attitude control problem.
△ Less
Submitted 29 December, 2020;
originally announced December 2020.
-
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning
Authors:
Wesley Joon-Wie Tann,
Jackie Tan ** Wei,
Joanna Purba,
Ee-Chien Chang
Abstract:
DDoS attacks are simple, effective, and still pose a significant threat even after more than two decades. Given the recent success in machine learning, it is interesting to investigate how we can leverage deep learning to filter out application layer attack requests. There are challenges in adopting deep learning solutions due to the ever-changing profiles, the lack of labeled data, and constraint…
▽ More
DDoS attacks are simple, effective, and still pose a significant threat even after more than two decades. Given the recent success in machine learning, it is interesting to investigate how we can leverage deep learning to filter out application layer attack requests. There are challenges in adopting deep learning solutions due to the ever-changing profiles, the lack of labeled data, and constraints in the online setting. Offline unsupervised learning methods can sidestep these hurdles by learning an anomaly detector $N$ from the normal-day traffic ${\mathcal N}$. However, anomaly detection does not exploit information acquired during attacks, and their performance typically is not satisfactory. In this paper, we propose two frameworks that utilize both the historic ${\mathcal N}$ and the mixture ${\mathcal M}$ traffic obtained during attacks, consisting of unlabeled requests. We also introduce a machine learning optimization problem that aims to sift out the attacks using ${\mathcal N}$ and ${\mathcal M}$. First, our proposed approach, inspired by statistical methods, extends an unsupervised anomaly detector $N$ to solve the problem using estimated conditional probability distributions. We adopt transfer learning to apply $N$ on ${\mathcal N}$ and ${\mathcal M}$ separately and efficiently, combining the results to obtain an online learner. Second, we formulate a specific loss function more suited for deep learning and use iterative training to solve it in the online setting. On publicly available datasets, our online learners achieve a $99.3\%$ improvement on false-positive rates compared to the baseline detection methods. In the offline setting, our approaches are competitive with classifiers trained on labeled data.
△ Less
Submitted 12 December, 2020;
originally announced December 2020.
-
Atomic spin-wave control and spin-dependent kicks with shaped subnanosecond pulses
Authors:
Yizun He,
Ling**g Ji,
Yuzhuo Wang,
Liyang Qiu,
Jian Zhao,
Yudi Ma,
Xing Huang,
Saijun Wu,
Darrick E. Chang
Abstract:
The absorption of traveling photons resonant with electric dipole transitions of an atomic gas naturally leads to electric dipole spin wave excitations. For a number of applications, it would be highly desirable to shape and coherently control the spatial waveform of the spin waves before spontaneous emission can occur. This paper details a recently developed optical control technique to achieve t…
▽ More
The absorption of traveling photons resonant with electric dipole transitions of an atomic gas naturally leads to electric dipole spin wave excitations. For a number of applications, it would be highly desirable to shape and coherently control the spatial waveform of the spin waves before spontaneous emission can occur. This paper details a recently developed optical control technique to achieve this goal, where counter-propagating, shaped sub-nanosecond pulses impart sub-wavelength geometric phases to the spin waves by cyclically driving an auxiliary transition. In particular, we apply this technique to reversibly shift the wave vector of a spin wave on the $D2$ line of laser-cooled $^{87}$Rb atoms, by driving an auxiliary $D1$ transition with shape-optimized pulses, so as to shut off and recall superradiance on demand. We investigate a spin-dependent momentum transfer during the spin-wave control process, which leads to a transient optical force as large as $\sim 1\hbar k$/ns, and study the limitations to the achieved $70\sim 75\%$ spin wave control efficiency by jointly characterizing the spin-wave control and matterwave acceleration. Aided by numerical modeling, we project potential future improvements of the control fidelity to the $99\%$ level when the atomic states are better prepared and by equip** a faster and more powerful pulse shaper. Our technique also enables a background-free measurement of the superradiant emission to unveil the precise scaling of the emission intensity and decay rate with optical depth.
△ Less
Submitted 26 December, 2020; v1 submitted 29 October, 2020;
originally announced October 2020.
-
Safe Handover in Mixed-Initiative Control for Cyber-Physical Systems
Authors:
Frederik Wiehr,
Anke Hirsch,
Florian Daiber,
Antonio Kruger,
Alisa Kovtunova,
Stefan Borgwardt,
Ernie Chang,
Vera Demberg,
Marcel Steinmetz,
Hoffmann Jorg
Abstract:
For mixed-initiative control between cyber-physical systems (CPS) and its users, it is still an open question how machines can safely hand over control to humans. In this work, we propose a concept to provide technological support that uses formal methods from AI -- description logic (DL) and automated planning -- to predict more reliably when a hand-over is necessary, and to increase the advance…
▽ More
For mixed-initiative control between cyber-physical systems (CPS) and its users, it is still an open question how machines can safely hand over control to humans. In this work, we propose a concept to provide technological support that uses formal methods from AI -- description logic (DL) and automated planning -- to predict more reliably when a hand-over is necessary, and to increase the advance notice for handovers by planning ahead of runtime. We combine this with methods from human-computer interaction (HCI) and natural language generation (NLG) to develop solutions for safe and smooth handovers and provide an example autonomous driving scenario. A study design is proposed with the assessment of qualitative feedback, cognitive load and trust in automation.
△ Less
Submitted 21 October, 2020;
originally announced October 2020.
-
DART: A Lightweight Quality-Suggestive Data-to-Text Annotation Tool
Authors:
Ernie Chang,
Jeriah Caplinger,
Alex Marin,
Xiaoyu Shen,
Vera Demberg
Abstract:
We present a lightweight annotation tool, the Data AnnotatoR Tool (DART), for the general task of labeling structured data with textual descriptions. The tool is implemented as an interactive application that reduces human efforts in annotating large quantities of structured data, e.g. in the format of a table or tree structure. By using a backend sequence-to-sequence model, our system iteratively…
▽ More
We present a lightweight annotation tool, the Data AnnotatoR Tool (DART), for the general task of labeling structured data with textual descriptions. The tool is implemented as an interactive application that reduces human efforts in annotating large quantities of structured data, e.g. in the format of a table or tree structure. By using a backend sequence-to-sequence model, our system iteratively analyzes the annotated labels in order to better sample unlabeled data. In a simulation experiment performed on annotating large quantities of structured data, DART has been shown to reduce the total number of annotations needed with active learning and automatically suggesting relevant labels.
△ Less
Submitted 1 December, 2020; v1 submitted 8 October, 2020;
originally announced October 2020.
-
Microscopic fine-grained instance classification through deep attention
Authors:
Mengran Fan,
Tapabrata Chakrabort,
Eric I-Chao Chang,
Yan Xu,
Jens Rittscher
Abstract:
Fine-grained classification of microscopic image data with limited samples is an open problem in computer vision and biomedical imaging. Deep learning based vision systems mostly deal with high number of low-resolution images, whereas subtle detail in biomedical images require higher resolution. To bridge this gap, we propose a simple yet effective deep network that performs two tasks simultaneous…
▽ More
Fine-grained classification of microscopic image data with limited samples is an open problem in computer vision and biomedical imaging. Deep learning based vision systems mostly deal with high number of low-resolution images, whereas subtle detail in biomedical images require higher resolution. To bridge this gap, we propose a simple yet effective deep network that performs two tasks simultaneously in an end-to-end manner. First, it utilises a gated attention module that can focus on multiple key instances at high resolution without extra annotations or region proposals. Second, the global structural features and local instance features are fused for final image level classification. The result is a robust but lightweight end-to-end trainable deep network that yields state-of-the-art results in two separate fine-grained multi-instance biomedical image classification tasks: a benchmark breast cancer histology dataset and our new fungi species mycology dataset. In addition, we demonstrate the interpretability of the proposed model by visualising the concordance of the learned features with clinically relevant features.
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Tracking Controller Design for Satellite Attitude Under Unknown Constant Disturbance Using Stable Embedding
Authors:
Wonshick Ko,
Karmvir Singh Phogat,
Nicolas Petit,
Dong Eui Chang
Abstract:
We propose a tracking control law for the fully actuated rigid body system in the presence of any unknown constant disturbance by employing quaternions with the stable embedding technique and Lyapunov stability theory. The stable embedding technique extends the attitude dynamics from the set of unit quaternions to the set of quaternions, which is a Euclidean space, such that the set of unit quater…
▽ More
We propose a tracking control law for the fully actuated rigid body system in the presence of any unknown constant disturbance by employing quaternions with the stable embedding technique and Lyapunov stability theory. The stable embedding technique extends the attitude dynamics from the set of unit quaternions to the set of quaternions, which is a Euclidean space, such that the set of unit quaternions is an invariant set of the extended dynamics. Such a stable extension of the system dynamics to a Euclidean space allows us to employ well studied Lyapunov techniques in Euclidean spaces such as LaSalle-Yoshizawa's theorem. A robust tracking control law is proposed for the attitude dynamics subject to unknown constant disturbance and the convergence properties of the tracking control law is rigorously proven. It is demonstrated with the help of numerical simulations that the proposed control law has a remarkable performance even in some challenging situations.
△ Less
Submitted 3 October, 2020;
originally announced October 2020.
-
Green function formalism for resonant interaction of x-rays with nuclei in structured media
Authors:
Xiang** Kong,
Darrick E. Chang,
Adriana Pálffy
Abstract:
The resonant interaction between x-ray photons and nuclei is one of the most exciting subjects of the burgeoning field of x-ray quantum optics. A resourceful platform used so far are thin-film x-ray cavities with embedded layers or Mössbauer nuclei such as $^{57}\mathrm{Fe}$. A new quantum optical model based on the classical electromagnetic Green's function is developed to investigate theoretical…
▽ More
The resonant interaction between x-ray photons and nuclei is one of the most exciting subjects of the burgeoning field of x-ray quantum optics. A resourceful platform used so far are thin-film x-ray cavities with embedded layers or Mössbauer nuclei such as $^{57}\mathrm{Fe}$. A new quantum optical model based on the classical electromagnetic Green's function is developed to investigate theoretically the nuclear response inside the x-ray cavity. The model is versatile and provides an intuitive picture about the influence of the cavity structure on the resulting spectra. We test its predictive powers with the help of the semiclassical coherent scattering formalism simulations and discuss our results for increasing complexity of layer structures.
△ Less
Submitted 1 October, 2020;
originally announced October 2020.
-
Evidence of state-dependence in the effectiveness of responsive neurostimulation for seizure modulation
Authors:
Sharon Chiang,
Ankit N. Khambhati,
Emily T. Wang,
Marina Vannucci,
Edward F. Chang,
Vikram R. Rao
Abstract:
An implanted device for brain-responsive neurostimulation (RNS System) is approved as an effective treatment to reduce seizures in adults with medically-refractory focal epilepsy. Clinical trials of the RNS System demonstrate population-level reduction in average seizure frequency, but therapeutic response is highly variable. Recent evidence links seizures to cyclical fluctuations in underlying ri…
▽ More
An implanted device for brain-responsive neurostimulation (RNS System) is approved as an effective treatment to reduce seizures in adults with medically-refractory focal epilepsy. Clinical trials of the RNS System demonstrate population-level reduction in average seizure frequency, but therapeutic response is highly variable. Recent evidence links seizures to cyclical fluctuations in underlying risk. We tested the hypothesis that effectiveness of responsive neurostimulation varies based on current state within cyclical risk fluctuations. We analyzed retrospective data from 25 adults with medically-refractory focal epilepsy implanted with the RNS System. Chronic electrocorticography was used to record electrographic seizures, and hidden Markov models decoded seizures into fluctuations in underlying risk. State-dependent associations of RNS System stimulation parameters with changes in risk were estimated. Higher charge density was associated with improved outcomes, both for remaining in a low seizure risk state and for transitioning from a high to a low seizure risk state. The effect of stimulation frequency depended on initial seizure risk state: when starting in a low risk state, higher stimulation frequencies were associated with remaining in a low risk state, but when starting in a high risk state, lower stimulation frequencies were associated with transition to a low risk state. Findings were consistent across bipolar and monopolar stimulation configurations. The impact of RNS on seizure frequency exhibits state-dependence, such that stimulation parameters which are effective in one seizure risk state may not be effective in another. These findings represent conceptual advances in understanding the therapeutic mechanism of RNS, and directly inform current practices of RNS tuning and the development of next-generation neurostimulation systems.
△ Less
Submitted 18 February, 2021; v1 submitted 29 September, 2020;
originally announced September 2020.
-
Low-energy Scattering and Effective Interactions of Two Baryons at $m_π\sim 450$ MeV from Lattice Quantum Chromodynamics
Authors:
Marc Illa,
Silas R. Beane,
Emmanuel Chang,
Zohreh Davoudi,
William Detmold,
David J. Murphy,
Kostas Orginos,
Assumpta Parreño,
Martin J. Savage,
Phiala E. Shanahan,
Michael L. Wagman,
Frank Winter
Abstract:
The interactions between two octet baryons are studied at low energies using lattice QCD (LQCD) with larger-than-physical quark masses corresponding to a pion mass of $m_π\sim 450$ MeV and a kaon mass of $m_{K}\sim 596$ MeV. The two-baryon systems that are analyzed range from strangeness $S=0$ to $S=-4$ and include the spin-singlet and triplet $NN$, $ΣN$ ($I=3/2$), and $ΞΞ$ states, the spin-single…
▽ More
The interactions between two octet baryons are studied at low energies using lattice QCD (LQCD) with larger-than-physical quark masses corresponding to a pion mass of $m_π\sim 450$ MeV and a kaon mass of $m_{K}\sim 596$ MeV. The two-baryon systems that are analyzed range from strangeness $S=0$ to $S=-4$ and include the spin-singlet and triplet $NN$, $ΣN$ ($I=3/2$), and $ΞΞ$ states, the spin-singlet $ΣΣ$ ($I=2$) and $ΞΣ$ ($I=3/2$) states, and the spin-triplet $ΞN$ ($I=0$) state. The $s$-wave scattering phase shifts, low-energy scattering parameters, and binding energies when applicable, are extracted using Lüscher's formalism. While the results are consistent with most of the systems being bound at this pion mass, the interactions in the spin-triplet $ΣN$ and $ΞΞ$ channels are found to be repulsive and do not support bound states. Using results from previous studies at a larger pion mass, an extrapolation of the binding energies to the physical point is performed and is compared with experimental values and phenomenological predictions. The low-energy coefficients in pionless EFT relevant for two-baryon interactions, including those responsible for $SU(3)$ flavor-symmetry breaking, are constrained. The $SU(3)$ symmetry is observed to hold approximately at the chosen values of the quark masses, as well as the $SU(6)$ spin-flavor symmetry, predicted at large $N_c$. A remnant of an accidental $SU(16)$ symmetry found previously at a larger pion mass is further observed. The $SU(6)$-symmetric EFT constrained by these LQCD calculations is used to make predictions for two-baryon systems for which the low-energy scattering parameters could not be determined with LQCD directly in this study, and to constrain the coefficients of all leading $SU(3)$ flavor-symmetric interactions, demonstrating the predictive power of two-baryon EFTs matched to LQCD.
△ Less
Submitted 23 March, 2021; v1 submitted 25 September, 2020;
originally announced September 2020.
-
State Space Expectation Propagation: Efficient Inference Schemes for Temporal Gaussian Processes
Authors:
William J. Wilkinson,
Paul E. Chang,
Michael Riis Andersen,
Arno Solin
Abstract:
We formulate approximate Bayesian inference in non-conjugate temporal and spatio-temporal Gaussian process models as a simple parameter update rule applied during Kalman smoothing. This viewpoint encompasses most inference schemes, including expectation propagation (EP), the classical (Extended, Unscented, etc.) Kalman smoothers, and variational inference. We provide a unifying perspective on thes…
▽ More
We formulate approximate Bayesian inference in non-conjugate temporal and spatio-temporal Gaussian process models as a simple parameter update rule applied during Kalman smoothing. This viewpoint encompasses most inference schemes, including expectation propagation (EP), the classical (Extended, Unscented, etc.) Kalman smoothers, and variational inference. We provide a unifying perspective on these algorithms, showing how replacing the power EP moment matching step with linearisation recovers the classical smoothers. EP provides some benefits over the traditional methods via introduction of the so-called cavity distribution, and we combine these benefits with the computational efficiency of linearisation, providing extensive empirical analysis demonstrating the efficacy of various algorithms under this unifying framework. We provide a fast implementation of all methods in JAX.
△ Less
Submitted 12 July, 2020;
originally announced July 2020.
-
Fast Variational Learning in State-Space Gaussian Process Models
Authors:
Paul E. Chang,
William J. Wilkinson,
Mohammad Emtiyaz Khan,
Arno Solin
Abstract:
Gaussian process (GP) regression with 1D inputs can often be performed in linear time via a stochastic differential equation formulation. However, for non-Gaussian likelihoods, this requires application of approximate inference methods which can make the implementation difficult, e.g., expectation propagation can be numerically unstable and variational inference can be computationally inefficient.…
▽ More
Gaussian process (GP) regression with 1D inputs can often be performed in linear time via a stochastic differential equation formulation. However, for non-Gaussian likelihoods, this requires application of approximate inference methods which can make the implementation difficult, e.g., expectation propagation can be numerically unstable and variational inference can be computationally inefficient. In this paper, we propose a new method that removes such difficulties. Building upon an existing method called conjugate-computation variational inference, our approach enables linear-time inference via Kalman recursions while avoiding numerical instabilities and convergence issues. We provide an efficient JAX implementation which exploits just-in-time compilation and allows for fast automatic differentiation through large for-loops. Overall, our approach leads to fast and stable variational inference in state-space GP models that can be scaled to time series with millions of data points.
△ Less
Submitted 17 July, 2020; v1 submitted 9 July, 2020;
originally announced July 2020.
-
Double Prioritized State Recycled Experience Replay
Authors:
Fanchen Bu,
Dong Eui Chang
Abstract:
Experience replay enables online reinforcement learning agents to store and reuse the previous experiences of interacting with the environment. In the original method, the experiences are sampled and replayed uniformly at random. A prior work called prioritized experience replay was developed where experiences are prioritized, so as to replay experiences seeming to be more important more frequentl…
▽ More
Experience replay enables online reinforcement learning agents to store and reuse the previous experiences of interacting with the environment. In the original method, the experiences are sampled and replayed uniformly at random. A prior work called prioritized experience replay was developed where experiences are prioritized, so as to replay experiences seeming to be more important more frequently. In this paper, we develop a method called double-prioritized state-recycled (DPSR) experience replay, prioritizing the experiences in both training stage and storing stage, as well as replacing the experiences in the memory with state recycling to make the best of experiences that seem to have low priorities temporarily. We used this method in Deep Q-Networks (DQN), and achieved a state-of-the-art result, outperforming the original method and prioritized experience replay on many Atari games.
△ Less
Submitted 21 September, 2020; v1 submitted 8 July, 2020;
originally announced July 2020.
-
SHADOWCAST: Controllable Graph Generation
Authors:
Wesley Joon-Wie Tann,
Ee-Chien Chang,
Bryan Hooi
Abstract:
We introduce the controllable graph generation problem, formulated as controlling graph attributes during the generative process to produce desired graphs with understandable structures. Using a transparent and straightforward Markov model to guide this generative process, practitioners can shape and understand the generated graphs. We propose ${\rm S{\small HADOW}C{\small AST}}$, a generative mod…
▽ More
We introduce the controllable graph generation problem, formulated as controlling graph attributes during the generative process to produce desired graphs with understandable structures. Using a transparent and straightforward Markov model to guide this generative process, practitioners can shape and understand the generated graphs. We propose ${\rm S{\small HADOW}C{\small AST}}$, a generative model capable of controlling graph generation while retaining the original graph's intrinsic properties. The proposed model is based on a conditional generative adversarial network. Given an observed graph and some user-specified Markov model parameters, ${\rm S{\small HADOW}C{\small AST}}$ controls the conditions to generate desired graphs. Comprehensive experiments on three real-world network datasets demonstrate our model's competitive performance in the graph generation task. Furthermore, we show its effective controllability by directing ${\rm S{\small HADOW}C{\small AST}}$ to generate hypothetical scenarios with different graph structures.
△ Less
Submitted 1 July, 2021; v1 submitted 5 June, 2020;
originally announced June 2020.
-
Maximum refractive index of an atomic medium
Authors:
Francesco Andreoli,
Michael J. Gullans,
Alexander A. High,
Antoine Browaeys,
Darrick E. Chang
Abstract:
It is interesting to observe that all optical materials with a positive refractive index have a value of index that is of order unity. Surprisingly, though, a deep understanding of the mechanisms that lead to this universal behavior seems to be lacking. Moreover, this observation is difficult to reconcile with the fact that a single, isolated atom is known to have a giant optical response, as char…
▽ More
It is interesting to observe that all optical materials with a positive refractive index have a value of index that is of order unity. Surprisingly, though, a deep understanding of the mechanisms that lead to this universal behavior seems to be lacking. Moreover, this observation is difficult to reconcile with the fact that a single, isolated atom is known to have a giant optical response, as characterized by a resonant scattering cross section that far exceeds its physical size. Here, we theoretically and numerically investigate the evolution of the optical properties of an ensemble of ideal atoms as a function of density, starting from the dilute gas limit, including the effects of multiple scattering and near-field interactions. Interestingly, despite the giant response of an isolated atom, we find that the maximum index does not indefinitely grow with increasing density, but rather reaches a limiting value $n\approx 1.7$. We propose an explanation based upon strong-disorder renormalization group theory, in which the near-field interaction combined with random atomic positions results in an inhomogeneous broadening of atomic resonance frequencies. This mechanism ensures that regardless of the physical atomic density, light at any given frequency only interacts with at most a few near-resonant atoms per cubic wavelength, thus limiting the maximum index attainable. Our work is a promising first step to understand the limits of refractive index from a bottom-up, atomic physics perspective, and also introduces renormalization group as a powerful tool to understand the generally complex problem of multiple scattering of light overall.
△ Less
Submitted 18 February, 2021; v1 submitted 2 June, 2020;
originally announced June 2020.
-
Random singlet phase of cold atoms coupled to a photonic crystal waveguide
Authors:
David Z. Li,
Marco T. Manzoni,
Darrick E. Chang
Abstract:
Systems consisting of cold atoms trapped near photonic crystal waveguides have recently emerged as an exciting platform for quantum atom-light interfaces. Such a system enables realization of tunable long-range interactions between internal states of atoms (spins), mediated by guided photons. Currently, experimental platforms are still limited by low filling fractions, where the atom number is muc…
▽ More
Systems consisting of cold atoms trapped near photonic crystal waveguides have recently emerged as an exciting platform for quantum atom-light interfaces. Such a system enables realization of tunable long-range interactions between internal states of atoms (spins), mediated by guided photons. Currently, experimental platforms are still limited by low filling fractions, where the atom number is much smaller than the number of sites at which atoms can potentially be trapped. Here, we show that this regime in fact enables interesting many-body quantum phenomena, which are typically associated with short-range disordered systems. As an example, we show how the system can realize the so-called "random singlet phase", in which all atoms pair into entangled singlets, but the pairing occurs over a distribution of ranges as opposed to nearest neighbors. We use a renormalization group method to obtain the distribution of spin entanglement in the random singlet phase, and show how this state can be approximately reached via adiabatic evolution from the ground state of a non-interacting Hamiltonian. We also discuss how experimentally this random singlet phase can be observed. We anticipate that this work will accelerate the route toward the exploration of strongly correlated matter in atom-nanophotonics interfaces, by avoiding the requirement of perfectly filled lattices.
△ Less
Submitted 26 May, 2020; v1 submitted 24 May, 2020;
originally announced May 2020.
-
Defending Model Inversion and Membership Inference Attacks via Prediction Purification
Authors:
Ziqi Yang,
Bin Shao,
Bohan Xuan,
Ee-Chien Chang,
Fan Zhang
Abstract:
Neural networks are susceptible to data inference attacks such as the model inversion attack and the membership inference attack, where the attacker could infer the reconstruction and the membership of a data sample from the confidence scores predicted by the target classifier. In this paper, we propose a unified approach, namely purification framework, to defend data inference attacks. It purifie…
▽ More
Neural networks are susceptible to data inference attacks such as the model inversion attack and the membership inference attack, where the attacker could infer the reconstruction and the membership of a data sample from the confidence scores predicted by the target classifier. In this paper, we propose a unified approach, namely purification framework, to defend data inference attacks. It purifies the confidence score vectors predicted by the target classifier by reducing their dispersion. The purifier can be further specialized in defending a particular attack via adversarial learning. We evaluate our approach on benchmark datasets and classifiers. We show that when the purifier is dedicated to one attack, it naturally defends the other one, which empirically demonstrates the connection between the two attacks. The purifier can effectively defend both attacks. For example, it can reduce the membership inference accuracy by up to 15% and increase the model inversion error by a factor of up to 4. Besides, it incurs less than 0.4% classification accuracy drop and less than 5.5% distortion to the confidence scores.
△ Less
Submitted 20 August, 2020; v1 submitted 8 May, 2020;
originally announced May 2020.
-
Neural Data-to-Text Generation via Jointly Learning the Segmentation and Correspondence
Authors:
Xiaoyu Shen,
Ernie Chang,
Hui Su,
Jie Zhou,
Dietrich Klakow
Abstract:
The neural attention model has achieved great success in data-to-text generation tasks. Though usually excelling at producing fluent text, it suffers from the problem of information missing, repetition and "hallucination". Due to the black-box nature of the neural attention architecture, avoiding these problems in a systematic way is non-trivial. To address this concern, we propose to explicitly s…
▽ More
The neural attention model has achieved great success in data-to-text generation tasks. Though usually excelling at producing fluent text, it suffers from the problem of information missing, repetition and "hallucination". Due to the black-box nature of the neural attention architecture, avoiding these problems in a systematic way is non-trivial. To address this concern, we propose to explicitly segment target text into fragment units and align them with their data correspondences. The segmentation and correspondence are jointly learned as latent variables without any human annotations. We further impose a soft statistical constraint to regularize the segmental granularity. The resulting architecture maintains the same expressive power as neural attention models, while being able to generate fully interpretable outputs with several times less computational cost. On both E2E and WebNLG benchmarks, we show the proposed model consistently outperforms its neural attention counterparts.
△ Less
Submitted 3 May, 2020;
originally announced May 2020.
-
Benefits and Pitfalls of Using Capture the Flag Games in University Courses
Authors:
Jan Vykopal,
Valdemar Švábenský,
Ee-Chien Chang
Abstract:
The concept of Capture the Flag (CTF) games for practicing cybersecurity skills is widespread in informal educational settings and leisure-time competitions. However, it is not much used in university courses. This paper summarizes our experience from using jeopardy CTF games as homework assignments in an introductory undergraduate course. Our analysis of data describing students' in-game actions…
▽ More
The concept of Capture the Flag (CTF) games for practicing cybersecurity skills is widespread in informal educational settings and leisure-time competitions. However, it is not much used in university courses. This paper summarizes our experience from using jeopardy CTF games as homework assignments in an introductory undergraduate course. Our analysis of data describing students' in-game actions and course performance revealed four aspects that should be addressed in the design of CTF tasks: scoring, scaffolding, plagiarism, and learning analytics capabilities of the used CTF platform. The paper addresses these aspects by sharing our recommendations. We believe that these recommendations are useful for cybersecurity instructors who consider using CTF games for assessment in university courses and developers of CTF game frameworks.
△ Less
Submitted 24 April, 2020;
originally announced April 2020.
-
Strong quantum correlations of light emitted by a single atom in free space
Authors:
Daniel Goncalves,
Morgan W. Mitchell,
Darrick E. Chang
Abstract:
We present a novel approach to engineer the photon correlations emerging from the interference between an input field and the field scattered by a single atom in free space. Nominally, the inefficient atom-light coupling causes the quantum correlations to be dominated by the input field alone. To overcome this issue, we propose the use of separate pump and probe beams, where the former increases t…
▽ More
We present a novel approach to engineer the photon correlations emerging from the interference between an input field and the field scattered by a single atom in free space. Nominally, the inefficient atom-light coupling causes the quantum correlations to be dominated by the input field alone. To overcome this issue, we propose the use of separate pump and probe beams, where the former increases the atomic emission to be comparable to the probe. Examining the second-order correlation function $g^{(2)}(τ)$ of the total field in the probe direction, we find that the addition of the pump formally plays the same role as increasing the coupling efficiency. We show that one can tune the correlation function $g^{(2)}(0)$ from zero (perfect anti-bunching) to infinite (extreme bunching) by a proper choice of pump amplitude. We further elucidate the origin of these correlations in terms of the transient atomic state following the detection of a photon.
△ Less
Submitted 4 April, 2020;
originally announced April 2020.
-
MaskFlownet: Asymmetric Feature Matching with Learnable Occlusion Mask
Authors:
Shengyu Zhao,
Yilun Sheng,
Yue Dong,
Eric I-Chao Chang,
Yan Xu
Abstract:
Feature war** is a core technique in optical flow estimation; however, the ambiguity caused by occluded areas during war** is a major problem that remains unsolved. In this paper, we propose an asymmetric occlusion-aware feature matching module, which can learn a rough occlusion mask that filters useless (occluded) areas immediately after feature war** without any explicit supervision. The p…
▽ More
Feature war** is a core technique in optical flow estimation; however, the ambiguity caused by occluded areas during war** is a major problem that remains unsolved. In this paper, we propose an asymmetric occlusion-aware feature matching module, which can learn a rough occlusion mask that filters useless (occluded) areas immediately after feature war** without any explicit supervision. The proposed module can be easily integrated into end-to-end network architectures and enjoys performance gains while introducing negligible computational cost. The learned occlusion mask can be further fed into a subsequent network cascade with dual feature pyramids with which we achieve state-of-the-art performance. At the time of submission, our method, called MaskFlownet, surpasses all published optical flow methods on the MPI Sintel, KITTI 2012 and 2015 benchmarks. Code is available at https://github.com/microsoft/MaskFlownet.
△ Less
Submitted 8 April, 2020; v1 submitted 24 March, 2020;
originally announced March 2020.
-
Soteria: A Provably Compliant User Right Manager Using a Novel Two-Layer Blockchain Technology
Authors:
Wei-Kang Fu,
Yi-Shan Lin,
Giovanni Campagna,
De-Yi Tsai,
Chun-Ting Liu,
Chung-Huan Mei,
Edward Y. Chang,
Monica S. Lam,
Shih-Wei Liao
Abstract:
Soteria is a user right management system designed to safeguard user-data privacy in a transparent and provable manner in compliance to regulations such as GDPR and CCPA. Soteria represents user data rights as formal executable sharing agreements, which can automatically be translated into a human readable form and enforced as data are queried. To support revocation and to prove compliance, an ind…
▽ More
Soteria is a user right management system designed to safeguard user-data privacy in a transparent and provable manner in compliance to regulations such as GDPR and CCPA. Soteria represents user data rights as formal executable sharing agreements, which can automatically be translated into a human readable form and enforced as data are queried. To support revocation and to prove compliance, an indelible, audited trail of the hash of data access and sharing agreements are stored on a two-layer distributed ledger. The main chain ensures partition tolerance and availability (PA) properties while side chains ensure consistency and availability (CA), thus providing the three properties of the CAP (consistency, availability, and partition tolerance) theorem. Besides depicting the two-layer architecture of Soteria, this paper evaluates representative consensus protocols and reports performance statistics.
△ Less
Submitted 24 March, 2020; v1 submitted 23 March, 2020;
originally announced March 2020.
-
Unsupervised Pidgin Text Generation By Pivoting English Data and Self-Training
Authors:
Ernie Chang,
David Ifeoluwa Adelani,
Xiaoyu Shen,
Vera Demberg
Abstract:
West African Pidgin English is a language that is significantly spoken in West Africa, consisting of at least 75 million speakers. Nevertheless, proper machine translation systems and relevant NLP datasets for pidgin English are virtually absent. In this work, we develop techniques targeted at bridging the gap between Pidgin English and English in the context of natural language generation. %As a…
▽ More
West African Pidgin English is a language that is significantly spoken in West Africa, consisting of at least 75 million speakers. Nevertheless, proper machine translation systems and relevant NLP datasets for pidgin English are virtually absent. In this work, we develop techniques targeted at bridging the gap between Pidgin English and English in the context of natural language generation. %As a proof of concept, we explore the proposed techniques in the area of data-to-text generation. By building upon the previously released monolingual Pidgin English text and parallel English data-to-text corpus, we hope to build a system that can automatically generate Pidgin English descriptions from structured data. We first train a data-to-English text generation system, before employing techniques in unsupervised neural machine translation and self-training to establish the Pidgin-to-English cross-lingual alignment. The human evaluation performed on the generated Pidgin texts shows that, though still far from being practically usable, the pivoting + self-training technique improves both Pidgin text fluency and relevance.
△ Less
Submitted 27 April, 2021; v1 submitted 18 March, 2020;
originally announced March 2020.
-
Confusing and Detecting ML Adversarial Attacks with Injected Attractors
Authors:
Jiyi Zhang,
Ee-Chien Chang,
Hwee Kuan Lee
Abstract:
Many machine learning adversarial attacks find adversarial samples of a victim model ${\mathcal M}$ by following the gradient of some attack objective functions, either explicitly or implicitly. To confuse and detect such attacks, we take the proactive approach that modifies those functions with the goal of misleading the attacks to some local minimals, or to some designated regions that can be ea…
▽ More
Many machine learning adversarial attacks find adversarial samples of a victim model ${\mathcal M}$ by following the gradient of some attack objective functions, either explicitly or implicitly. To confuse and detect such attacks, we take the proactive approach that modifies those functions with the goal of misleading the attacks to some local minimals, or to some designated regions that can be easily picked up by an analyzer. To achieve this goal, we propose adding a large number of artifacts, which we called $attractors$, onto the otherwise smooth function. An attractor is a point in the input space, where samples in its neighborhood have gradient pointing toward it. We observe that decoders of watermarking schemes exhibit properties of attractors and give a generic method that injects attractors from a watermark decoder into the victim model ${\mathcal M}$. This principled approach allows us to leverage on known watermarking schemes for scalability and robustness and provides explainability of the outcomes. Experimental studies show that our method has competitive performance. For instance, for un-targeted attacks on CIFAR-10 dataset, we can reduce the overall attack success rate of DeepFool to 1.9%, whereas known defense LID, FS and MagNet can reduce the rate to 90.8%, 98.5% and 78.5% respectively.
△ Less
Submitted 8 March, 2021; v1 submitted 5 March, 2020;
originally announced March 2020.
-
Invariant extended Kalman filter on matrix Lie groups
Authors:
Karmvir Singh Phogat,
Dong Eui Chang
Abstract:
We derive symmetry preserving invariant extended Kalman filters (IEKF) on matrix Lie groups. These Kalman filters have an advantage over conventional extended Kalman filters as the error dynamics for such filters are independent of the group configuration which, in turn, provides a uniform estimate of the region of convergence. The proposed IEKF differs from existing techniques in literature on th…
▽ More
We derive symmetry preserving invariant extended Kalman filters (IEKF) on matrix Lie groups. These Kalman filters have an advantage over conventional extended Kalman filters as the error dynamics for such filters are independent of the group configuration which, in turn, provides a uniform estimate of the region of convergence. The proposed IEKF differs from existing techniques in literature on the account that it is derived using minimal tools from differential geometry that simplifies its representation and derivation to a large extent. The filter error dynamics is defined on the Lie algebra directly instead of identifying the Lie algebra with an Euclidean space or defining the error dynamics in local coordinates using exponential map, and the associated differential Riccati equations are described on the corresponding space of linear operators using tensor algebra. The proposed filter is implemented for the attitude dynamics of the rigid body, which is a benchmark problem in control, and its performance is compared against a conventional extended Kalman filter (EKF). Numerical experiments support that the IEKF is computationally less intensive and gives better performance than the EKF.
△ Less
Submitted 28 December, 2019;
originally announced December 2019.
-
On Neural Phone Recognition of Mixed-Source ECoG Signals
Authors:
Ahmed Hussen Abdelaziz,
Shuo-Yiin Chang,
Nelson Morgan,
Erik Edwards,
Dorothea Kolossa,
Dan Ellis,
David A. Moses,
Edward F. Chang
Abstract:
The emerging field of neural speech recognition (NSR) using electrocorticography has recently attracted remarkable research interest for studying how human brains recognize speech in quiet and noisy surroundings. In this study, we demonstrate the utility of NSR systems to objectively prove the ability of human beings to attend to a single speech source while suppressing the interfering signals in…
▽ More
The emerging field of neural speech recognition (NSR) using electrocorticography has recently attracted remarkable research interest for studying how human brains recognize speech in quiet and noisy surroundings. In this study, we demonstrate the utility of NSR systems to objectively prove the ability of human beings to attend to a single speech source while suppressing the interfering signals in a simulated cocktail party scenario. The experimental results show that the relative degradation of the NSR system performance when tested in a mixed-source scenario is significantly lower than that of automatic speech recognition (ASR). In this paper, we have significantly enhanced the performance of our recently published framework by using manual alignments for initialization instead of the flat start technique. We have also improved the NSR system performance by accounting for the possible transcription mismatch between the acoustic and neural signals.
△ Less
Submitted 12 December, 2019;
originally announced December 2019.
-
Self-Expiring Data Capsule using Trusted Execution Environment
Authors:
Hung Dang,
Ee-Chien Chang
Abstract:
Data privacy is unarguably of extreme importance. Nonetheless, there exist various daunting challenges to safe-guarding data privacy. These challenges stem from the fact that data owners have little control over their data once it has transgressed their local storage and been managed by third parties whose trustworthiness is questionable at times. Our work seeks to enhance data privacy by construc…
▽ More
Data privacy is unarguably of extreme importance. Nonetheless, there exist various daunting challenges to safe-guarding data privacy. These challenges stem from the fact that data owners have little control over their data once it has transgressed their local storage and been managed by third parties whose trustworthiness is questionable at times. Our work seeks to enhance data privacy by constructing a self-expiring data capsule. Sensitive data is encapsulated into a capsule which is associated with an access policy an expiring condition. The former indicates eligibility of functions that can access the data, and the latter dictates when the data should become inaccessible to anyone, including the previously eligible functions. Access to the data capsule, as well as its dismantling once the expiring condition is met, are governed by a committee of independent and mutually distrusting nodes. The pivotal contribution of our work is an integration of hardware primitive, state machine replication and threshold secret sharing in the design of the self-expiring data encapsulation framework. We implement the proposed framework in a system called TEEKAP. Our empirical experiments conducted on a realistic deployment setting with the access control committee spanning across four geographical regions reveal that TEEKAP can process access requests at scale with sub-second latency.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Dynamics of many-body photon bound states in chiral waveguide QED
Authors:
Sahand Mahmoodian,
Giuseppe Calajó,
Darrick E. Chang,
Klemens Hammerer,
Anders S. Sørensen
Abstract:
We theoretically study the few- and many-body dynamics of photons in chiral waveguides. In particular, we examine pulse propagation through a system of $N$ two-level systems chirally coupled to a waveguide. We show that the system supports correlated multi-photon bound states, which have a well-defined photon number $n$ and propagate through the system with a group delay scaling as $1/n^2$. This h…
▽ More
We theoretically study the few- and many-body dynamics of photons in chiral waveguides. In particular, we examine pulse propagation through a system of $N$ two-level systems chirally coupled to a waveguide. We show that the system supports correlated multi-photon bound states, which have a well-defined photon number $n$ and propagate through the system with a group delay scaling as $1/n^2$. This has the interesting consequence that, during propagation, an incident coherent state pulse breaks up into different bound state components that can become spatially separated at the output in a sufficiently long system. For sufficiently many photons and sufficiently short systems, we show that linear combinations of $n$-body bound states recover the well-known phenomenon of mean-field solitons in self-induced transparency. For longer systems, however, the solitons break apart through quantum correlated dynamics. Our work thus covers the entire spectrum from few-photon quantum propagation, to genuine quantum many-body (atom and photon) phenomena, and ultimately the quantum-to-classical transition. Finally, we demonstrate that the bound states can undergo elastic scattering with additional photons. Together, our results demonstrate that photon bound states are truly distinct physical objects emerging from the most elementary light-matter interaction between photons and two-level emitters. Our work opens the door to studying quantum many-body physics and soliton physics with photons in chiral waveguide QED.
△ Less
Submitted 7 May, 2020; v1 submitted 13 October, 2019;
originally announced October 2019.
-
Model Predictive Tracking Control for Invariant Systems on Matrix Lie Groups via Stable Embedding into Euclidean Spaces
Authors:
Dong Eui Chang,
Karmvir Singh Phogat,
Jongeun Choi
Abstract:
For controller design for systems on manifolds embedded in Euclidean space, it is convenient to utilize a theory that requires a single global coordinate system on the ambient Euclidean space rather than multiple local charts on the manifold or coordinate-free tools from differential geometry. In this article, we apply such a theory to design model predictive tracking controllers for systems whose…
▽ More
For controller design for systems on manifolds embedded in Euclidean space, it is convenient to utilize a theory that requires a single global coordinate system on the ambient Euclidean space rather than multiple local charts on the manifold or coordinate-free tools from differential geometry. In this article, we apply such a theory to design model predictive tracking controllers for systems whose dynamics evolve on manifolds and illustrate its efficacy with the fully actuated rigid body attitude control system.
△ Less
Submitted 12 October, 2019;
originally announced October 2019.
-
Geometric control of collective spontaneous emission
Authors:
Yizun He,
Ling**g Ji,
Yuzhuo Wang,
Liyang Qiu,
Jian Zhao,
Yudi Ma,
Xing Huang,
Darrick E. Chang,
Saijun Wu
Abstract:
Dipole spin-wave states of atomic ensembles with wave vector ${\bf k}(ω)$ mismatched from the dispersion relation of light are difficult to access by far-field excitation but may support rich phenomena beyond the traditional phase-matched scenario in quantum optics. We propose and demonstrate an optical technique to efficiently access these states. In particular, subnanosecond laser pulses shaped…
▽ More
Dipole spin-wave states of atomic ensembles with wave vector ${\bf k}(ω)$ mismatched from the dispersion relation of light are difficult to access by far-field excitation but may support rich phenomena beyond the traditional phase-matched scenario in quantum optics. We propose and demonstrate an optical technique to efficiently access these states. In particular, subnanosecond laser pulses shaped by a home-developed wideband modulation method are applied to shift the spin wave in ${\bf k}$ space with state-dependent geometric phase patterning, in an error-resilient fashion and on timescales much faster than spontaneous emission. We verify this control through the redirection, switch off, and recall of collectively enhanced emission from a $^{87}$Rb gas with $\sim 75\%$ single-step efficiency. Our work represents a first step toward efficient control of electric dipole spin waves for studying many-body dissipative dynamics of excited gases, as well as for numerous quantum optical applications.
△ Less
Submitted 18 November, 2020; v1 submitted 5 October, 2019;
originally announced October 2019.
-
Design of Globally Exponentially Convergent Continuous Observers for Velocity Bias and State for Systems on Real Matrix Groups
Authors:
Dong Eui Chang
Abstract:
We propose globally exponentially convergent continuous observers for invariant kinematic systems on finite-dimensional matrix Lie groups. Such an observer estimates, from measurements of landmarks, vectors and biased velocity, both the system state and the unknown constant bias in velocity measurement, where the state belongs to the state-space Lie group and the velocity to the Lie algebra of the…
▽ More
We propose globally exponentially convergent continuous observers for invariant kinematic systems on finite-dimensional matrix Lie groups. Such an observer estimates, from measurements of landmarks, vectors and biased velocity, both the system state and the unknown constant bias in velocity measurement, where the state belongs to the state-space Lie group and the velocity to the Lie algebra of the Lie group. The main technique is to embed a given system defined on a matrix Lie group into Euclidean space and build observers in the Euclidean space. The theory is illustrated with the special Euclidean group in three dimensions.
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
Brain2Char: A Deep Architecture for Decoding Text from Brain Recordings
Authors:
Pengfei Sun,
Gopala K. Anumanchipalli,
Edward F. Chang
Abstract:
Decoding language representations directly from the brain can enable new Brain-Computer Interfaces (BCI) for high bandwidth human-human and human-machine communication. Clinically, such technologies can restore communication in people with neurological conditions affecting their ability to speak. In this study, we propose a novel deep network architecture Brain2Char, for directly decoding text (sp…
▽ More
Decoding language representations directly from the brain can enable new Brain-Computer Interfaces (BCI) for high bandwidth human-human and human-machine communication. Clinically, such technologies can restore communication in people with neurological conditions affecting their ability to speak. In this study, we propose a novel deep network architecture Brain2Char, for directly decoding text (specifically character sequences) from direct brain recordings (called Electrocorticography, ECoG). Brain2Char framework combines state-of-the-art deep learning modules --- 3D Inception layers for multiband spatiotemporal feature extraction from neural data and bidirectional recurrent layers, dilated convolution layers followed by language model weighted beam search to decode character sequences, optimizing a connectionist temporal classification (CTC) loss. Additionally, given the highly non-linear transformations that underlie the conversion of cortical function to character sequences, we perform regularizations on the network's latent representations motivated by insights into cortical encoding of speech production and artifactual aspects specific to ECoG data acquisition. To do this, we impose auxiliary losses on latent representations for articulatory movements, speech acoustics and session specific non-linearities. In 3 participants tested here, Brain2Char achieves 10.6\%, 8.5\% and 7.0\% Word Error Rates (WER) respectively on vocabulary sizes ranging from 1200 to 1900 words. Brain2Char also performs well when 2 participants silently mimed sentences. These results set a new state-of-the-art on decoding text from brain and demonstrate the potential of Brain2Char as a high-performance communication BCI.
△ Less
Submitted 3 September, 2019;
originally announced September 2019.
-
RelGAN: Multi-Domain Image-to-Image Translation via Relative Attributes
Authors:
Po-Wei Wu,
Yu-**g Lin,
Che-Han Chang,
Edward Y. Chang,
Shih-Wei Liao
Abstract:
Multi-domain image-to-image translation has gained increasing attention recently. Previous methods take an image and some target attributes as inputs and generate an output image with the desired attributes. However, such methods have two limitations. First, these methods assume binary-valued attributes and thus cannot yield satisfactory results for fine-grained control. Second, these methods requ…
▽ More
Multi-domain image-to-image translation has gained increasing attention recently. Previous methods take an image and some target attributes as inputs and generate an output image with the desired attributes. However, such methods have two limitations. First, these methods assume binary-valued attributes and thus cannot yield satisfactory results for fine-grained control. Second, these methods require specifying the entire set of target attributes, even if most of the attributes would not be changed. To address these limitations, we propose RelGAN, a new method for multi-domain image-to-image translation. The key idea is to use relative attributes, which describes the desired change on selected attributes. Our method is capable of modifying images by changing particular attributes of interest in a continuous manner while preserving the other attributes. Experimental results demonstrate both the quantitative and qualitative effectiveness of our method on the tasks of facial attribute transfer and interpolation.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Measuring the Orbital Parameters of Radial Velocity Systems in Mean Motion Resonance---a Case Study of HD 200964
Authors:
M. M. Rosenthal,
W. Jacobson-Galan,
B. Nelson,
R. A. Murray-Clay,
J. A. Burt,
B. Holden,
E. Chang,
N. Kaaz,
J. Yant,
R. P. Butler,
S. S. Vogt
Abstract:
The presence of mean motion resonances (MMRs) complicates analysis and fitting of planetary systems observed through the radial velocity (RV) technique. MMR can allow planets to remain stable in regions of phase space where strong planet-planet interactions would otherwise destabilize the system. These stable orbits can occupy small phase space volumes, allowing MMRs to strongly constrain system p…
▽ More
The presence of mean motion resonances (MMRs) complicates analysis and fitting of planetary systems observed through the radial velocity (RV) technique. MMR can allow planets to remain stable in regions of phase space where strong planet-planet interactions would otherwise destabilize the system. These stable orbits can occupy small phase space volumes, allowing MMRs to strongly constrain system parameters, but making searches for stable orbital parameters challenging. Furthermore, libration of the resonant angle and dynamical interaction between the planets introduces another, long period variation into the observed RV signal, complicating analysis of the periods of the planets in the system. We discuss this phenomenon using the example of HD 200964. By searching through parameter space and numerically integrating each proposed set of planetary parameters to test for long term stability, we find stable solutions in the 7:5 and 3:2 MMRs in addition to the originally identified 4:3 MMR. The 7:5 configuration provides the best match to the data, while the 3:2 configuration provides the most easily understood formation scenario. In reanalysis of the originally published shorter-baseline data, we find fits in both the 4:3 and 3:2 resonances, but not the 7:5. Because the time baseline of the data is less than the resonant libration period, the current best fit to the data may not reflect the actual resonant configuration. In the absence of a full sample of the longer libration period, we find that it is of paramount importance to incorporate long term stability when fitting for the system's orbital configuration.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Knee menisci segmentation and relaxometry of 3D ultrashort echo time (UTE) cones MR imaging using attention U-Net with transfer learning
Authors:
Michal Byra,
Mei Wu,
Xiaodong Zhang,
Hyungseok Jang,
Ya-Jun Ma,
Eric Y Chang,
Sameer Shah,
Jiang Du
Abstract:
The purpose of this work is to develop a deep learning-based method for knee menisci segmentation in 3D ultrashort echo time (UTE) cones magnetic resonance (MR) imaging, and to automatically determine MR relaxation times, namely the T1, T1$ρ$, and T2* parameters, which can be used to assess knee osteoarthritis (OA). Whole knee joint imaging was performed using 3D UTE cones sequences to collect dat…
▽ More
The purpose of this work is to develop a deep learning-based method for knee menisci segmentation in 3D ultrashort echo time (UTE) cones magnetic resonance (MR) imaging, and to automatically determine MR relaxation times, namely the T1, T1$ρ$, and T2* parameters, which can be used to assess knee osteoarthritis (OA). Whole knee joint imaging was performed using 3D UTE cones sequences to collect data from 61 human subjects. Regions of interest (ROIs) were outlined by two experienced radiologists based on subtracted T1$ρ$-weighted MR images. Transfer learning was applied to develop 2D attention U-Net convolutional neural networks for the menisci segmentation based on each radiologist's ROIs separately. Dice scores were calculated to assess segmentation performance. Next, the T1, T1$ρ$, T2* relaxations, and ROI areas were determined for the manual and automatic segmentations, then compared.The models developed using ROIs provided by two radiologists achieved high Dice scores of 0.860 and 0.833, while the radiologists' manual segmentations achieved a Dice score of 0.820. Linear correlation coefficients for the T1, T1$ρ$, and T2* relaxations calculated using the automatic and manual segmentations ranged between 0.90 and 0.97, and there were no associated differences between the estimated average meniscal relaxation parameters. The deep learning models achieved segmentation performance equivalent to the inter-observer variability of two radiologists. The proposed deep learning-based approach can be used to efficiently generate automatic segmentations and determine meniscal relaxations times. The method has the potential to help radiologists with the assessment of meniscal diseases, such as OA.
△ Less
Submitted 5 August, 2019;
originally announced August 2019.
-
Recursive Cascaded Networks for Unsupervised Medical Image Registration
Authors:
Shengyu Zhao,
Yue Dong,
Eric I-Chao Chang,
Yan Xu
Abstract:
We present recursive cascaded networks, a general architecture that enables learning deep cascades, for deformable image registration. The proposed architecture is simple in design and can be built on any base network. The moving image is warped successively by each cascade and finally aligned to the fixed image; this procedure is recursive in a way that every cascade learns to perform a progressi…
▽ More
We present recursive cascaded networks, a general architecture that enables learning deep cascades, for deformable image registration. The proposed architecture is simple in design and can be built on any base network. The moving image is warped successively by each cascade and finally aligned to the fixed image; this procedure is recursive in a way that every cascade learns to perform a progressive deformation for the current warped image. The entire system is end-to-end and jointly trained in an unsupervised manner. In addition, enabled by the recursive architecture, one cascade can be iteratively applied for multiple times during testing, which approaches a better fit between each of the image pairs. We evaluate our method on 3D medical images, where deformable registration is most commonly applied. We demonstrate that recursive cascaded networks achieve consistent, significant gains and outperform state-of-the-art methods. The performance reveals an increasing trend as long as more cascades are trained, while the limit is not observed. Code is available at https://github.com/microsoft/Recursive-Cascaded-Networks.
△ Less
Submitted 22 October, 2019; v1 submitted 29 July, 2019;
originally announced July 2019.
-
Deep Reinforcement Learning Based Robot Arm Manipulation with Efficient Training Data through Simulation
Authors:
Xiaowei Xing,
Dong Eui Chang
Abstract:
Deep reinforcement learning trains neural networks using experiences sampled from the replay buffer, which is commonly updated at each time step. In this paper, we propose a method to update the replay buffer adaptively and selectively to train a robot arm to accomplish a suction task in simulation. The response time of the agent is thoroughly taken into account. The state transitions that remain…
▽ More
Deep reinforcement learning trains neural networks using experiences sampled from the replay buffer, which is commonly updated at each time step. In this paper, we propose a method to update the replay buffer adaptively and selectively to train a robot arm to accomplish a suction task in simulation. The response time of the agent is thoroughly taken into account. The state transitions that remain stuck at the boundary of constraint are not stored. The policy trained with our method works better than the one with the common replay buffer update method. The result is demonstrated both by simulation and by experiment with a real robot arm.
△ Less
Submitted 5 September, 2019; v1 submitted 16 July, 2019;
originally announced July 2019.
-
Improved Reinforcement Learning through Imitation Learning Pretraining Towards Image-based Autonomous Driving
Authors:
Tianqi Wang,
Dong Eui Chang
Abstract:
We present a training pipeline for the autonomous driving task given the current camera image and vehicle speed as the input to produce the throttle, brake, and steering control output. The simulator Airsim's convenient weather and lighting API provides a sufficient diversity during training which can be very helpful to increase the trained policy's robustness. In order to not limit the possible p…
▽ More
We present a training pipeline for the autonomous driving task given the current camera image and vehicle speed as the input to produce the throttle, brake, and steering control output. The simulator Airsim's convenient weather and lighting API provides a sufficient diversity during training which can be very helpful to increase the trained policy's robustness. In order to not limit the possible policy's performance, we use a continuous and deterministic control policy setting. We utilize ResNet-34 as our actor and critic networks with some slight changes in the fully connected layers. Considering human's mastery of this task and the high-complexity nature of this task, we first use imitation learning to mimic the given human policy and leverage the trained policy and its weights to the reinforcement learning phase for which we use DDPG. This combination shows a considerable performance boost comparing to both pure imitation learning and pure DDPG for the autonomous driving task.
△ Less
Submitted 16 July, 2019;
originally announced July 2019.
-
Noise Removal of FTIR Hyperspectral Images via MMSE
Authors:
Chang Sik Lee,
Hyeong Geun Yu,
Dong Jo Park,
Dong Eui Chang,
Hyunwoo Nam,
Byeong Hwang Park
Abstract:
Fourier transform infrared (FTIR) hyperspectral imaging systems are deployed in various fields where spectral information is exploited. Chemical warfare agent (CWA) detection is one of such fields and it requires a fast and accurate process from the measurement to the visualization of detection results, including noise removal. A general concern of existing noise removal algorithms is a trade-off…
▽ More
Fourier transform infrared (FTIR) hyperspectral imaging systems are deployed in various fields where spectral information is exploited. Chemical warfare agent (CWA) detection is one of such fields and it requires a fast and accurate process from the measurement to the visualization of detection results, including noise removal. A general concern of existing noise removal algorithms is a trade-off between time and performance. This paper suggests a minimum mean square error (MMSE) approach as an efficient noise removal algorithm for FTIR hyperspectral images. The experimental result shows that the MMSE estimator spends less time to achieve comparable performance to the existing algorithms.
△ Less
Submitted 29 December, 2019; v1 submitted 16 July, 2019;
originally announced July 2019.