-
A Dual Memory Structure for Efficient Use of Replay Memory in Deep Reinforcement Learning
Authors:
Wonshick Ko,
Dong Eui Chang
Abstract:
In this paper, we propose a dual memory structure for reinforcement learning algorithms with replay memory. The dual memory consists of a main memory that stores various data and a cache memory that manages the data and trains the reinforcement learning agent efficiently. Experimental results show that the dual memory structure achieves higher training and test scores than the conventional single…
▽ More
In this paper, we propose a dual memory structure for reinforcement learning algorithms with replay memory. The dual memory consists of a main memory that stores various data and a cache memory that manages the data and trains the reinforcement learning agent efficiently. Experimental results show that the dual memory structure achieves higher training and test scores than the conventional single memory structure in three selected environments of OpenAI Gym. This implies that the dual memory structure enables better and more efficient training than the single memory structure.
△ Less
Submitted 15 July, 2019;
originally announced July 2019.
-
Robotic Navigation using Entropy-Based Exploration
Authors:
Muhammad Usama,
Dong Eui Chang
Abstract:
Robotic navigation concerns the task in which a robot should be able to find a safe and feasible path and traverse between two points in a complex environment. We approach the problem of robotic navigation using reinforcement learning and use deep $Q$-networks to train agents to solve the task of robotic navigation. We compare the Entropy-Based Exploration (EBE) with the widely used $ε$-greedy exp…
▽ More
Robotic navigation concerns the task in which a robot should be able to find a safe and feasible path and traverse between two points in a complex environment. We approach the problem of robotic navigation using reinforcement learning and use deep $Q$-networks to train agents to solve the task of robotic navigation. We compare the Entropy-Based Exploration (EBE) with the widely used $ε$-greedy exploration strategy by training agents using both of them in simulation. The trained agents are then tested on different versions of the environment to test the generalization ability of the learned policies. We also implement the learned policies on a real robot in complex real environment without any fine tuning and compare the effectiveness of the above-mentioned exploration strategies in the real world setting. Video showing experiments on TurtleBot3 platform is available at \url{https://youtu.be/NHT-EiN_4n8}.
△ Less
Submitted 17 June, 2019;
originally announced June 2019.
-
Learning-Driven Exploration for Reinforcement Learning
Authors:
Muhammad Usama,
Dong Eui Chang
Abstract:
Effective and intelligent exploration has been an unresolved problem for reinforcement learning. Most contemporary reinforcement learning relies on simple heuristic strategies such as $ε$-greedy exploration or adding Gaussian noise to actions. These heuristics, however, are unable to intelligently distinguish the well explored and the unexplored regions of state space, which can lead to inefficien…
▽ More
Effective and intelligent exploration has been an unresolved problem for reinforcement learning. Most contemporary reinforcement learning relies on simple heuristic strategies such as $ε$-greedy exploration or adding Gaussian noise to actions. These heuristics, however, are unable to intelligently distinguish the well explored and the unexplored regions of state space, which can lead to inefficient use of training time. We introduce entropy-based exploration (EBE) that enables an agent to explore efficiently the unexplored regions of state space. EBE quantifies the agent's learning in a state using merely state-dependent action values and adaptively explores the state space, i.e. more exploration for the unexplored region of the state space. We perform experiments on a diverse set of environments and demonstrate that EBE enables efficient exploration that ultimately results in faster learning without having to tune any hyperparameter.
The code to reproduce the experiments is given at \url{https://github.com/Usama1002/EBE-Exploration} and the supplementary video is given at \url{https://youtu.be/nJggIjjzKic}.
△ Less
Submitted 16 October, 2020; v1 submitted 17 June, 2019;
originally announced June 2019.
-
Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking
Authors:
Ziqi Yang,
Hung Dang,
Ee-Chien Chang
Abstract:
The rise of machine learning as a service and model sharing platforms has raised the need of traitor-tracing the models and proof of authorship. Watermarking technique is the main component of existing methods for protecting copyright of models. In this paper, we show that distillation, a widely used transformation technique, is a quite effective attack to remove watermark embedded by existing alg…
▽ More
The rise of machine learning as a service and model sharing platforms has raised the need of traitor-tracing the models and proof of authorship. Watermarking technique is the main component of existing methods for protecting copyright of models. In this paper, we show that distillation, a widely used transformation technique, is a quite effective attack to remove watermark embedded by existing algorithms. The fragility is due to the fact that distillation does not retain the watermark embedded in the model that is redundant and independent to the main learning task. We design ingrain in response to the destructive distillation. It regularizes a neural network with an ingrainer model, which contains the watermark, and forces the model to also represent the knowledge of the ingrainer. Our extensive evaluations show that ingrain is more robust to distillation attack and its robustness against other widely used transformation techniques is comparable to existing methods.
△ Less
Submitted 14 June, 2019;
originally announced June 2019.
-
Lifestate: Event-Driven Protocols and Callback Control Flow (Extended Version)
Authors:
Shawn Meier,
Sergio Mover,
Bor-Yuh Evan Chang
Abstract:
Develo** interactive applications (apps) against event-driven software frameworks such as Android is notoriously difficult. To create apps that behave as expected, developers must follow complex and often implicit asynchronous programming protocols. Such protocols intertwine the proper registering of callbacks to receive control from the framework with appropriate application-programming interfa…
▽ More
Develo** interactive applications (apps) against event-driven software frameworks such as Android is notoriously difficult. To create apps that behave as expected, developers must follow complex and often implicit asynchronous programming protocols. Such protocols intertwine the proper registering of callbacks to receive control from the framework with appropriate application-programming interface (API) calls that in turn affect the set of possible future callbacks. An app violates the protocol when, for example, it calls a particular API method in a state of the framework where such a call is invalid. What makes automated reasoning hard in this domain is largely what makes programming apps against such frameworks hard: the specification of the protocol is unclear, and the control flow is complex, asynchronous, and higher-order. In this paper, we tackle the problem of specifying and modeling event-driven application-programming protocols. In particular, we formalize a core meta-model that captures the dialogue between event-driven frameworks and application callbacks. Based on this meta-model, we define a language called lifestate that permits precise and formal descriptions of application-programming protocols and the callback control flow imposed by the event-driven framework. Lifestate unifies modeling what app callbacks can expect of the framework with specifying rules the app must respect when calling into the framework. In this way, we effectively combine lifecycle constraints and typestate rules. To evaluate the effectiveness of lifestate modeling, we provide a dynamic verification algorithm that takes as input a trace of execution of an app and a lifestate protocol specification to either produce a trace witnessing a protocol violation or a proof that no such trace is realizable.
△ Less
Submitted 12 June, 2019; v1 submitted 11 June, 2019;
originally announced June 2019.
-
Optical waveguiding by atomic entanglement in multilevel atom arrays
Authors:
A. Asenjo-Garcia,
H. J. Kimble,
D. E. Chang
Abstract:
The optical properties of sub-wavelength arrays of atoms or other quantum emitters have attracted significant interest recently. For example, the strong constructive or destructive interference of emitted light enables arrays to function as nearly perfect mirrors, support topological edge states, and allow for exponentially better quantum memories. In these proposals, the assumed atomic structure…
▽ More
The optical properties of sub-wavelength arrays of atoms or other quantum emitters have attracted significant interest recently. For example, the strong constructive or destructive interference of emitted light enables arrays to function as nearly perfect mirrors, support topological edge states, and allow for exponentially better quantum memories. In these proposals, the assumed atomic structure was simple, consisting of a unique electronic ground state. Within linear optics, the system is then equivalent to a periodic array of classical dielectric particles, whose periodicity supports the emergence of guided modes. However, it has not been known whether such phenomena persist in the presence of hyperfine structure, as exhibited by most quantum emitters. Here, we show that waveguiding can arise from rich atomic entanglement as a quantum many-body effect, and elucidate the necessary conditions. Our work represents a significant step forward in understanding collective effects in arrays of atoms with realistic electronic structure.
△ Less
Submitted 19 December, 2019; v1 submitted 5 June, 2019;
originally announced June 2019.
-
Enhancing Transformation-based Defenses using a Distribution Classifier
Authors:
Connie Kou,
Hwee Kuan Lee,
Ee-Chien Chang,
Teck Khim Ng
Abstract:
Adversarial attacks on convolutional neural networks (CNN) have gained significant attention and there have been active research efforts on defense mechanisms. Stochastic input transformation methods have been proposed, where the idea is to recover the image from adversarial attack by random transformation, and to take the majority vote as consensus among the random samples. However, the transform…
▽ More
Adversarial attacks on convolutional neural networks (CNN) have gained significant attention and there have been active research efforts on defense mechanisms. Stochastic input transformation methods have been proposed, where the idea is to recover the image from adversarial attack by random transformation, and to take the majority vote as consensus among the random samples. However, the transformation improves the accuracy on adversarial images at the expense of the accuracy on clean images. While it is intuitive that the accuracy on clean images would deteriorate, the exact mechanism in which how this occurs is unclear. In this paper, we study the distribution of softmax induced by stochastic transformations. We observe that with random transformations on the clean images, although the mass of the softmax distribution could shift to the wrong class, the resulting distribution of softmax could be used to correct the prediction. Furthermore, on the adversarial counterparts, with the image transformation, the resulting shapes of the distribution of softmax are similar to the distributions from the clean images. With these observations, we propose a method to improve existing transformation-based defenses. We train a separate lightweight distribution classifier to recognize distinct features in the distributions of softmax outputs of transformed images. Our empirical studies show that our distribution classifier, by training on distributions obtained from clean images only, outperforms majority voting for both clean and adversarial images. Our method is generic and can be integrated with existing transformation-based defenses.
△ Less
Submitted 30 January, 2020; v1 submitted 1 June, 2019;
originally announced June 2019.
-
Effective Medical Test Suggestions Using Deep Reinforcement Learning
Authors:
Yang-En Chen,
Kai-Fu Tang,
Yu-Shao Peng,
Edward Y. Chang
Abstract:
Effective medical test suggestions benefit both patients and physicians to conserve time and improve diagnosis accuracy. In this work, we show that an agent can learn to suggest effective medical tests. We formulate the problem as a stage-wise Markov decision process and propose a reinforcement learning method to train the agent. We introduce a new representation of multiple action policy along wi…
▽ More
Effective medical test suggestions benefit both patients and physicians to conserve time and improve diagnosis accuracy. In this work, we show that an agent can learn to suggest effective medical tests. We formulate the problem as a stage-wise Markov decision process and propose a reinforcement learning method to train the agent. We introduce a new representation of multiple action policy along with the training method of the proposed representation. Furthermore, a new exploration scheme is proposed to accelerate the learning of disease distributions. Our experimental results demonstrate that the accuracy of disease diagnosis can be significantly improved with good medical test suggestions.
△ Less
Submitted 31 May, 2019; v1 submitted 30 May, 2019;
originally announced May 2019.
-
G2R Bound: A Generalization Bound for Supervised Learning from GAN-Synthetic Data
Authors:
Fu-Chieh Chang,
Hao-Jen Wang,
Chun-Nan Chou,
Edward Y. Chang
Abstract:
Performing supervised learning from the data synthesized by using Generative Adversarial Networks (GANs), dubbed GAN-synthetic data, has two important applications. First, GANs may generate more labeled training data, which may help improve classification accuracy. Second, in scenarios where real data cannot be released outside certain premises for privacy and/or security reasons, using GAN- synth…
▽ More
Performing supervised learning from the data synthesized by using Generative Adversarial Networks (GANs), dubbed GAN-synthetic data, has two important applications. First, GANs may generate more labeled training data, which may help improve classification accuracy. Second, in scenarios where real data cannot be released outside certain premises for privacy and/or security reasons, using GAN- synthetic data to conduct training is a plausible alternative. This paper proposes a generalization bound to guarantee the generalization capability of a classifier learning from GAN-synthetic data. This generalization bound helps developers gauge the generalization gap between learning from synthetic data and testing on real data, and can therefore provide the clues to improve the generalization capability.
△ Less
Submitted 29 May, 2019;
originally announced May 2019.
-
KG-GAN: Knowledge-Guided Generative Adversarial Networks
Authors:
Che-Han Chang,
Chun-Hsien Yu,
Szu-Ying Chen,
Edward Y. Chang
Abstract:
Can generative adversarial networks (GANs) generate roses of various colors given only roses of red petals as input? The answer is negative, since GANs' discriminator would reject all roses of unseen petal colors. In this study, we propose knowledge-guided GAN (KG-GAN) to fuse domain knowledge with the GAN framework. KG-GAN trains two generators; one learns from data whereas the other learns from…
▽ More
Can generative adversarial networks (GANs) generate roses of various colors given only roses of red petals as input? The answer is negative, since GANs' discriminator would reject all roses of unseen petal colors. In this study, we propose knowledge-guided GAN (KG-GAN) to fuse domain knowledge with the GAN framework. KG-GAN trains two generators; one learns from data whereas the other learns from knowledge with a constraint function. Experimental results demonstrate the effectiveness of KG-GAN in generating unseen flower categories from seen categories given textual descriptions of the unseen ones.
△ Less
Submitted 23 September, 2019; v1 submitted 29 May, 2019;
originally announced May 2019.
-
Autonomous Membership Service for Enclave Applications
Authors:
Hung Dang,
Ee-Chien Chang
Abstract:
Trusted Execution Environment, or enclave, promises to protect data confidentiality and execution integrity of an outsourced computation on an untrusted host. Extending the protection to distributed applications that run on physically separated hosts, however, remains non-trivial. For instance, the current enclave provisioning model hinders elasticity of cloud applications. Furthermore, it remains…
▽ More
Trusted Execution Environment, or enclave, promises to protect data confidentiality and execution integrity of an outsourced computation on an untrusted host. Extending the protection to distributed applications that run on physically separated hosts, however, remains non-trivial. For instance, the current enclave provisioning model hinders elasticity of cloud applications. Furthermore, it remains unclear how an enclave process could verify if there exists another concurrently running enclave process instantiated using the same codebase, or count a number of such processes. In this paper, we seek an autonomous membership service for enclave applications. The application owner only needs to partake in instantiating the very first process of the application, whereas all subsequent process commission and decommission will be administered by existing and active processes of that very application. To achieve both safety and liveness, our protocol design admits unjust excommunication of a non-faulty process from the membership group. We implement the proposed membership service in a system called AMES. Our experimental study shows that AMES incurs an overhead of 5% - 16% compared to vanilla enclave execution.
△ Less
Submitted 15 May, 2019;
originally announced May 2019.
-
Distributed Layer-Partitioned Training for Privacy-Preserved Deep Learning
Authors:
Chun-Hsien Yu,
Chun-Nan Chou,
Emily Chang
Abstract:
Deep Learning techniques have achieved remarkable results in many domains. Often, training deep learning models requires large datasets, which may require sensitive information to be uploaded to the cloud to accelerate training. To adequately protect sensitive information, we propose distributed layer-partitioned training with step-wise activation functions for privacy-preserving deep learning. Ex…
▽ More
Deep Learning techniques have achieved remarkable results in many domains. Often, training deep learning models requires large datasets, which may require sensitive information to be uploaded to the cloud to accelerate training. To adequately protect sensitive information, we propose distributed layer-partitioned training with step-wise activation functions for privacy-preserving deep learning. Experimental results attest our method to be simple and effective.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.
-
Enhancement of Energy-Based Swing-Up Controller via Entropy Search
Authors:
Chang Sik Lee,
Dong Eui Chang
Abstract:
An energy based approach for stabilizing a mechanical system has offered a simple yet powerful control scheme. However, since it does not impose such strong constraints on parameter space of the controller, finding appropriate parameter values for an optimal controller is known to be hard. This paper intends to generate an optimal energy-based controller for swinging up a rotary inverted pendulum,…
▽ More
An energy based approach for stabilizing a mechanical system has offered a simple yet powerful control scheme. However, since it does not impose such strong constraints on parameter space of the controller, finding appropriate parameter values for an optimal controller is known to be hard. This paper intends to generate an optimal energy-based controller for swinging up a rotary inverted pendulum, also known as the Furuta pendulum, by applying the Bayesian optimization called Entropy Search. Simulations and experiments show that the optimal controller has an improved performance compared to a nominal controller for various initial conditions.
△ Less
Submitted 3 April, 2019; v1 submitted 2 April, 2019;
originally announced April 2019.
-
Quantitative Ultrasound and B-mode Image Texture Features Correlate with Collagen and Myelin Content in Human Ulnar Nerve Fascicles
Authors:
Michal Byra,
Lidi Wan,
Jonathan Wong,
Jiang Du,
Sameer Shah,
Michael Andre,
Eric Chang
Abstract:
We investigate the usefulness of quantitative ultrasound (QUS) and B-mode texture features for characterization of ulnar nerve fascicles. Ultrasound data were acquired from cadaveric specimens using a nominal 30 MHz probe. Next, the nerves were extracted to prepare histology sections. 85 fascicles were matched between the B-mode images and the histology sections. For each fascicle image, we select…
▽ More
We investigate the usefulness of quantitative ultrasound (QUS) and B-mode texture features for characterization of ulnar nerve fascicles. Ultrasound data were acquired from cadaveric specimens using a nominal 30 MHz probe. Next, the nerves were extracted to prepare histology sections. 85 fascicles were matched between the B-mode images and the histology sections. For each fascicle image, we selected an intra-fascicular region of interest. We used histology sections to determine features related to the concentration of collagen and myelin, and ultrasound data to calculate backscatter coefficient (-24.89 dB $\pm$ 8.31), attenuation coefficient (0.92 db/cm-MHz $\pm$ 0.04), Nakagami parameter (1.01 $\pm$ 0.18) and entropy (6.92 $\pm$ 0.83), as well as B-mode texture features obtained via the gray level co-occurrence matrix algorithm. Significant Spearman's rank correlations between the combined collagen and myelin concentrations were obtained for the backscatter coefficient (R=-0.68), entropy (R=-0.51), and for several texture features. Our study demonstrates that QUS may potentially provide information on structural components of nerve fascicles.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.
-
Attitude Observer on SO(3) with Time-Varying Reference Directions
Authors:
Kanishke Gamagedara,
Taeyoung Lee,
Dong Eui Chang
Abstract:
This paper introduces an advanced Lyapunov stability analysis for an attitude observer that has been developed on the special orthogonal group. In particular, when the attitude observer is constructed based on multiple direction measurements toward known reference points, a local exponential stability has been established by linearization, under the assumption that those reference points are fixed…
▽ More
This paper introduces an advanced Lyapunov stability analysis for an attitude observer that has been developed on the special orthogonal group. In particular, when the attitude observer is constructed based on multiple direction measurements toward known reference points, a local exponential stability has been established by linearization, under the assumption that those reference points are fixed in the inertial frame. Several modifications have been proposed to deal with reference directions changing over time. Here, we present an alternative Lyapunov analysis to show that the attitude observer still exhibits exponential stability for time-varying reference directions, under the assumption that the observer gain is sufficiently large relative to the rate of change of the reference directions. These are illustrated by a numerical example, followed by experimental results with visual marker detection in an indoor space.
△ Less
Submitted 9 March, 2019;
originally announced March 2019.
-
Interaction-aware Kalman Neural Networks for Trajectory Prediction
Authors:
Ce Ju,
Zheng Wang,
Cheng Long,
Xiaoyu Zhang,
Dong Eui Chang
Abstract:
Forecasting the motion of surrounding obstacles (vehicles, bicycles, pedestrians and etc.) benefits the on-road motion planning for intelligent and autonomous vehicles. Complex scenes always yield great challenges in modeling the patterns of surrounding traffic. For example, one main challenge comes from the intractable interaction effects in a complex traffic system. In this paper, we propose a m…
▽ More
Forecasting the motion of surrounding obstacles (vehicles, bicycles, pedestrians and etc.) benefits the on-road motion planning for intelligent and autonomous vehicles. Complex scenes always yield great challenges in modeling the patterns of surrounding traffic. For example, one main challenge comes from the intractable interaction effects in a complex traffic system. In this paper, we propose a multi-layer architecture Interaction-aware Kalman Neural Networks (IaKNN) which involves an interaction layer for resolving high-dimensional traffic environmental observations as interaction-aware accelerations, a motion layer for transforming the accelerations to interaction aware trajectories, and a filter layer for estimating future trajectories with a Kalman filter network. Attributed to the multiple traffic data sources, our end-to-end trainable approach technically fuses dynamic and interaction-aware trajectories boosting the prediction performance. Experiments on the NGSIM dataset demonstrate that IaKNN outperforms the state-of-the-art methods in terms of effectiveness for traffic trajectory prediction.
△ Less
Submitted 25 January, 2021; v1 submitted 28 February, 2019;
originally announced February 2019.
-
Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment
Authors:
Ziqi Yang,
Ee-Chien Chang,
Zhenkai Liang
Abstract:
The rise of deep learning technique has raised new privacy concerns about the training data and test data. In this work, we investigate the model inversion problem in the adversarial settings, where the adversary aims at inferring information about the target model's training data and test data from the model's prediction values. We develop a solution to train a second neural network that acts as…
▽ More
The rise of deep learning technique has raised new privacy concerns about the training data and test data. In this work, we investigate the model inversion problem in the adversarial settings, where the adversary aims at inferring information about the target model's training data and test data from the model's prediction values. We develop a solution to train a second neural network that acts as the inverse of the target model to perform the inversion. The inversion model can be trained with black-box accesses to the target model. We propose two main techniques towards training the inversion model in the adversarial settings. First, we leverage the adversary's background knowledge to compose an auxiliary set to train the inversion model, which does not require access to the original training data. Second, we design a truncation-based technique to align the inversion model to enable effective inversion of the target model from partial predictions that the adversary obtains on victim user's data. We systematically evaluate our inversion approach in various machine learning tasks and model architectures on multiple image datasets. Our experimental results show that even with no full knowledge about the target model's training data, and with only partial prediction values, our inversion approach is still able to perform accurate inversion of the target model, and outperform previous approaches.
△ Less
Submitted 22 February, 2019;
originally announced February 2019.
-
Unsupervised 3D End-to-End Medical Image Registration with Volume Tweening Network
Authors:
Shengyu Zhao,
Tingfung Lau,
Ji Luo,
Eric I-Chao Chang,
Yan Xu
Abstract:
3D medical image registration is of great clinical importance. However, supervised learning methods require a large amount of accurately annotated corresponding control points (or morphing), which are very difficult to obtain. Unsupervised learning methods ease the burden of manual annotation by exploiting unlabeled data without supervision. In this paper, we propose a new unsupervised learning me…
▽ More
3D medical image registration is of great clinical importance. However, supervised learning methods require a large amount of accurately annotated corresponding control points (or morphing), which are very difficult to obtain. Unsupervised learning methods ease the burden of manual annotation by exploiting unlabeled data without supervision. In this paper, we propose a new unsupervised learning method using convolutional neural networks under an end-to-end framework, Volume Tweening Network (VTN), for 3D medical image registration. We propose three innovative technical components: (1) An end-to-end cascading scheme that resolves large displacement; (2) An efficient integration of affine registration network; and (3) An additional invertibility loss that encourages backward consistency. Experiments demonstrate that our algorithm is 880x faster (or 3.3x faster without GPU acceleration) than traditional optimization-based methods and achieves state-of-theart performance in medical image registration.
△ Less
Submitted 30 October, 2019; v1 submitted 13 February, 2019;
originally announced February 2019.
-
Extraordinary subradiance with lossless excitation transfer in dipole-coupled nano-rings of quantum emitters
Authors:
Maria Moreno-Cardoner,
David Plankensteiner,
Laurin Ostermann,
Darrick E. Chang,
Helmut Ritsch
Abstract:
A ring of sub-wavelength spaced dipole-coupled quantum emitters possesses only few radiant but many extraordinarily subradiant collective modes. These exhibit a 3D-confined spatial radiation field pattern forming a nano-scale high-Q optical resonator. We show that tailoring the geometry, orientation and distance between two such rings allows for increasing the ratio of coherent ring-to-ring coupli…
▽ More
A ring of sub-wavelength spaced dipole-coupled quantum emitters possesses only few radiant but many extraordinarily subradiant collective modes. These exhibit a 3D-confined spatial radiation field pattern forming a nano-scale high-Q optical resonator. We show that tailoring the geometry, orientation and distance between two such rings allows for increasing the ratio of coherent ring-to-ring coupling versus free-space emission by several orders of magnitude. In particular we find that subradiant excitations, when delocalized over several ring sites, are effectively transported between the rings with a high fidelity.
△ Less
Submitted 29 January, 2019;
originally announced January 2019.
-
Modeling neural dynamics during speech production using a state space variational autoencoder
Authors:
Pengfei Sun,
David A. Moses,
Edward Chang
Abstract:
Characterizing the neural encoding of behavior remains a challenging task in many research areas due in part to complex and noisy spatiotemporal dynamics of evoked brain activity. An important aspect of modeling these neural encodings involves separation of robust, behaviorally relevant signals from background activity, which often contains signals from irrelevant brain processes and decaying info…
▽ More
Characterizing the neural encoding of behavior remains a challenging task in many research areas due in part to complex and noisy spatiotemporal dynamics of evoked brain activity. An important aspect of modeling these neural encodings involves separation of robust, behaviorally relevant signals from background activity, which often contains signals from irrelevant brain processes and decaying information from previous behavioral events. To achieve this separation, we develop a two-branch State Space Variational AutoEncoder (SSVAE) model to individually describe the instantaneous evoked foreground signals and the context-dependent background signals. We modeled the spontaneous speech-evoked brain dynamics using smoothed Gaussian mixture models. By applying the proposed SSVAE model to track ECoG dynamics in one participant over multiple hours, we find that the model can predict speech-related dynamics more accurately than other latent factor inference algorithms. Our results demonstrate that separately modeling the instantaneous speech-evoked and slow context-dependent brain dynamics can enhance tracking performance, which has important implications for the development of advanced neural encoding and decoding models in various neuroscience sub-disciplines.
△ Less
Submitted 13 January, 2019;
originally announced January 2019.
-
Holographic Superconductors: An Analytic Method Revisit
Authors:
En-Jui Chang,
Chia-Jui Chou,
Yi Yang
Abstract:
We study a non-minimal holographic superconductors model in both non-backreaction and fullbackreaction cases using an analytic method. We calculate the condensate of the dilaton and the critical temperature of the phase transition. We also study the properties of the electric conductivity in various parameters.
We study a non-minimal holographic superconductors model in both non-backreaction and fullbackreaction cases using an analytic method. We calculate the condensate of the dilaton and the critical temperature of the phase transition. We also study the properties of the electric conductivity in various parameters.
△ Less
Submitted 8 March, 2019; v1 submitted 11 December, 2018;
originally announced December 2018.
-
Towards Robust Neural Networks with Lipschitz Continuity
Authors:
Muhammad Usama,
Dong Eui Chang
Abstract:
Deep neural networks have shown remarkable performance across a wide range of vision-based tasks, particularly due to the availability of large-scale datasets for training and better architectures. However, data seen in the real world are often affected by distortions that not accounted for by the training datasets. In this paper, we address the challenge of robustness and stability of neural netw…
▽ More
Deep neural networks have shown remarkable performance across a wide range of vision-based tasks, particularly due to the availability of large-scale datasets for training and better architectures. However, data seen in the real world are often affected by distortions that not accounted for by the training datasets. In this paper, we address the challenge of robustness and stability of neural networks and propose a general training method that can be used to make the existing neural network architectures more robust and stable to input visual perturbations while using only available datasets for training. Proposed training method is convenient to use as it does not require data augmentation or changes in the network architecture. We provide theoretical proof as well as empirical evidence for the efficiency of the proposed training method by performing experiments with existing neural network architectures and demonstrate that same architecture when trained with the proposed training method perform better than when trained with conventional training approach in the presence of noisy datasets.
△ Less
Submitted 21 November, 2018;
originally announced November 2018.
-
Feedback Integrators for Nonholonomic Mechanical Systems
Authors:
Dong Eui Chang,
Matthew Perlmutter
Abstract:
The theory of feedback integrators is extended to handle mechanical systems with nonholonomic constraints with or without symmetry, so as to produce numerical integrators that preserve the nonholonomic constraints as well as other conserved quantities. To extend the feedback integrators, we develop a suitable extension theory for nonholonomic systems, and also a corresponding reduction theory for…
▽ More
The theory of feedback integrators is extended to handle mechanical systems with nonholonomic constraints with or without symmetry, so as to produce numerical integrators that preserve the nonholonomic constraints as well as other conserved quantities. To extend the feedback integrators, we develop a suitable extension theory for nonholonomic systems, and also a corresponding reduction theory for systems with symmetry. It is then applied to various nonholonomic systems such as the Suslov problem on SO(3), the knife edge, the Chaplygin sleigh, the vertical rolling disk, the roller racer, the Heisenberg system, and the nonholonomic oscillator.
△ Less
Submitted 8 November, 2018;
originally announced November 2018.
-
Non-equilibrium diagrammatic approach to strongly interacting photons
Authors:
Johannes Lang,
Darrick E. Chang,
Francesco Piazza
Abstract:
We develop a non-equilibrium field-theoretical approach, based on a systematic diagrammatic expansion, for strongly interacting photons in optically dense atomic media. We consider the case where the characteristic photon-propagation range $L_P$ is much larger than the interatomic spacing $a$ and where the density of atomic excitations is low enough to neglect saturation effects. In the highly pol…
▽ More
We develop a non-equilibrium field-theoretical approach, based on a systematic diagrammatic expansion, for strongly interacting photons in optically dense atomic media. We consider the case where the characteristic photon-propagation range $L_P$ is much larger than the interatomic spacing $a$ and where the density of atomic excitations is low enough to neglect saturation effects. In the highly polarizable medium the photons experience nonlinearities through the interactions they inherit from the atoms. If the atom-atom interaction range $L_E$ is also large compared to $a$, we show that scattering processes with momentum transfer between photons are suppressed by a factor $a/L_E$. We are then able to perform a self-consistent resummation of a specific (Hartree-like) diagram subclass and obtain quantitative results in the highly non-perturbative regime of large single-atom cooperativity. Here we find important, conceptually new collective phenomena emerging due to the dissipative nature of the interactions, which even give rise to novel phase transitions. The robustness of these is investigated by inclusion of the leading corrections in $a/L_E$. We consider specific applications to photons propagating under EIT conditions along waveguides near atomic arrays as well as within Rydberg ensembles.
△ Less
Submitted 18 January, 2021; v1 submitted 30 October, 2018;
originally announced October 2018.
-
Interaction-induced transparency for strong-coupling polaritons
Authors:
Johannes Lang,
Darrick E. Chang,
Francesco Piazza
Abstract:
The propagation of light in strongly coupled atomic media takes place through the formation of polaritons - hybrid quasi-particles resulting from a superposition of an atomic and a photonic excitation. Here we consider the propagation under the condition of electromagnetically-induced transparency and show that a novel many-body phenomenon can appear due to strong, dissipative interactions between…
▽ More
The propagation of light in strongly coupled atomic media takes place through the formation of polaritons - hybrid quasi-particles resulting from a superposition of an atomic and a photonic excitation. Here we consider the propagation under the condition of electromagnetically-induced transparency and show that a novel many-body phenomenon can appear due to strong, dissipative interactions between the polaritons. Upon increasing the photon-pump strength, we find a first-order transition between an opaque phase with strongly broadened polaritons and a transparent phase where a long-lived polariton branch with highly tunable occupation emerges. Across this non-equilibrium phase transition, the transparency window is reconstructed via nonlinear interference effects induced by the dissipative polariton interactions. Our predictions are based on a systematic diagrammatic expansion of the non-equilibrium Dyson equations which is quantitatively valid, even in the non-perturbative regime of large single-atom cooperativities, provided the polariton interactions are sufficiently long ranged. Such a regime can be reached in photonic crystal waveguides thanks to the tunability of interactions, allowing to observe the interaction-induced-transparency transition even at low polariton densities.
△ Less
Submitted 30 October, 2018;
originally announced October 2018.
-
Topological quantum optics using atom-like emitter arrays coupled to photonic crystals
Authors:
Janos Perczel,
Johannes Borregaard,
Darrick E. Chang,
Susanne F. Yelin,
Mikhail D. Lukin
Abstract:
We propose a nanophotonic platform for topological quantum optics. Our system is composed of a two-dimensional lattice of non-linear quantum emitters with optical transitions embedded in a photonic crystal slab. The emitters interact through the guided modes of the photonic crystal, and a uniform magnetic field gives rise to large topological band gaps and an almost completely flat topological ban…
▽ More
We propose a nanophotonic platform for topological quantum optics. Our system is composed of a two-dimensional lattice of non-linear quantum emitters with optical transitions embedded in a photonic crystal slab. The emitters interact through the guided modes of the photonic crystal, and a uniform magnetic field gives rise to large topological band gaps and an almost completely flat topological band. Topological edge states arise on the boundaries of the system that are protected by the large gap against missing lattice sites and to the inhomogeneous broadening of emitters. These results pave the way for exploring topological many-body states in quantum optical systems.
△ Less
Submitted 10 April, 2019; v1 submitted 29 October, 2018;
originally announced October 2018.
-
Type-directed Bounding of Collections in Reactive Programs
Authors:
Tianhan Lu,
Pavol Cerny,
Bor-Yuh Evan Chang,
Ashutosh Trivedi
Abstract:
Our aim is to statically verify that in a given reactive program, the length of collection variables does not grow beyond a given bound. We propose a scalable type-based technique that checks that each collection variable has a given refinement type that specifies constraints about its length. A novel feature of our refinement types is that the refinements can refer to AST counters that track how…
▽ More
Our aim is to statically verify that in a given reactive program, the length of collection variables does not grow beyond a given bound. We propose a scalable type-based technique that checks that each collection variable has a given refinement type that specifies constraints about its length. A novel feature of our refinement types is that the refinements can refer to AST counters that track how many times an AST node has been executed. This feature enables type refinements to track limited flow-sensitive information. We generate verification conditions that ensure that the AST counters are used consistently, and that the types imply the given bound. The verification conditions are discharged by an off-the-shelf SMT solver. Experimental results demonstrate that our technique is scalable, and effective at verifying reactive programs with respect to requirements on length of collections.
△ Less
Submitted 28 January, 2019; v1 submitted 24 October, 2018;
originally announced October 2018.
-
Waveguide-mediated interaction of artificial atoms in the strong coupling regime
Authors:
Mohammad Mirhosseini,
Eunjong Kim,
Xueyue Zhang,
Alp Sipahigil,
Paul B. Dieterle,
Andrew J. Keller,
Ana Asenjo-Garcia,
Darrick E. Chang,
Oskar Painter
Abstract:
Waveguide quantum electrodynamics studies photon-mediated interactions of quantum emitters in a one-dimensional radiation channel. Although signatures of such interactions have been observed previously in a variety of physical systems, observation of coherent cooperative dynamics has been obscured by radiative decay of atoms into the waveguide. Employing transmon qubits as artificial atoms coupled…
▽ More
Waveguide quantum electrodynamics studies photon-mediated interactions of quantum emitters in a one-dimensional radiation channel. Although signatures of such interactions have been observed previously in a variety of physical systems, observation of coherent cooperative dynamics has been obscured by radiative decay of atoms into the waveguide. Employing transmon qubits as artificial atoms coupled to a microwave coplanar waveguide, here we observe dynamical oscillations in an open system where a designated probe qubit interacts with an entangled dark state of an array of qubits which effectively traps radiation as an atomic cavity. The qubit-cavity system is shown to achieve a large cooperativity of $\mathcal{C}=172$ due to collective enhancement of photon-mediated interactions, entering the strong coupling regime. The quantum coherence of the dark state cavity is also explored through its nonlinear response at the single-excitation level. With realistic refinements, this system is suitable for studying the many-body dynamics of large ($N>10$) quantum spin chains, synthesizing highly non-classical radiation fields on demand, and implementing universal quantum logic operations with high fidelity on information encoded within decoherence-free subspaces.
△ Less
Submitted 25 September, 2018;
originally announced September 2018.
-
MBS: Macroblock Scaling for CNN Model Reduction
Authors:
Yu-Hsun Lin,
Chun-Nan Chou,
Edward Y. Chang
Abstract:
In this paper we propose the macroblock scaling (MBS) algorithm, which can be applied to various CNN architectures to reduce their model size. MBS adaptively reduces each CNN macroblock depending on its information redundancy measured by our proposed effective flops. Empirical studies conducted with ImageNet and CIFAR-10 attest that MBS can reduce the model size of some already compact CNN models,…
▽ More
In this paper we propose the macroblock scaling (MBS) algorithm, which can be applied to various CNN architectures to reduce their model size. MBS adaptively reduces each CNN macroblock depending on its information redundancy measured by our proposed effective flops. Empirical studies conducted with ImageNet and CIFAR-10 attest that MBS can reduce the model size of some already compact CNN models, e.g., MobileNetV2 (25.03% further reduction) and ShuffleNet (20.74%), and even ultra-deep ones such as ResNet-101 (51.67%) and ResNet-1202 (72.71%) with negligible accuracy degradation. MBS also performs better reduction at a much lower cost than the state-of-the-art optimization-based methods do. MBS's simplicity and efficiency, its flexibility to work with any CNN model, and its scalability to work with models of any depth make it an attractive choice for CNN model size reduction.
△ Less
Submitted 14 April, 2019; v1 submitted 18 September, 2018;
originally announced September 2018.
-
How lovebirds fly in crosswinds based on minimal visual information
Authors:
Daniel Quinn,
Daniel Kress,
Eric Chang,
Andrea Stein,
Michal Wegrzynski,
David Lentink
Abstract:
Flying birds navigate effectively through crosswinds, even when wind speeds are as high as flight speeds. What information birds use to sense crosswinds and compensate is largely unknown. We found that lovebirds can navigate 45-degree crosswinds similarly well in forest, lake, and cave-like visual environments. They navigate effectively using only a dim point light source as a beacon, despite bein…
▽ More
Flying birds navigate effectively through crosswinds, even when wind speeds are as high as flight speeds. What information birds use to sense crosswinds and compensate is largely unknown. We found that lovebirds can navigate 45-degree crosswinds similarly well in forest, lake, and cave-like visual environments. They navigate effectively using only a dim point light source as a beacon, despite being diurnal and raised in captivity. To maintain their heading, the lovebirds turn their bodies into the wind mid- flight, while orienting their heads towards the goal with neck angles up to 30 degrees. We show how this wind compensation can be achieved using a combination of passive aerodynamics and active control informed by muscle proprioception, a sensory input previously thought to be unimportant in detecting wind.
△ Less
Submitted 14 September, 2018;
originally announced September 2018.
-
Single-photon bound states in atomic ensembles
Authors:
Yidan Wang,
Michael J. Gullans,
Antoine Browaeys,
J. V. Porto,
Darrick E. Chang,
Alexey V. Gorshkov
Abstract:
We illustrate the existence of single-excitation bound states for propagating photons interacting with $N$ two-level atoms. These bound states can be calculated from an effective spin model, and their existence relies on dissipation in the system. The appearance of these bound states is in a one-to-one correspondence with zeros in the single-photon transmission and with divergent bunching in the s…
▽ More
We illustrate the existence of single-excitation bound states for propagating photons interacting with $N$ two-level atoms. These bound states can be calculated from an effective spin model, and their existence relies on dissipation in the system. The appearance of these bound states is in a one-to-one correspondence with zeros in the single-photon transmission and with divergent bunching in the second-order photon-photon correlation function. We also formulate a dissipative version of Levinson's theorem for this system by looking at the relation between the number of bound states and the winding number of the transmission phases. This theorem allows a direct experimental measurement of the number of bound states using the measured transmission phases.
△ Less
Submitted 4 September, 2018;
originally announced September 2018.
-
Fair Marketplace for Secure Outsourced Computations
Authors:
Hung Dang,
Dat Le Tien,
Ee-Chien Chang
Abstract:
The cloud computing paradigm offers clients ubiquitous and on demand access to a shared pool of computing resources, enabling the clients to provision scalable services with minimal management effort. Such a pool of resources, however, is typically owned and controlled by a single service provider, making it a single-point-of-failure. This paper presents Kosto - a framework that provisions a fair…
▽ More
The cloud computing paradigm offers clients ubiquitous and on demand access to a shared pool of computing resources, enabling the clients to provision scalable services with minimal management effort. Such a pool of resources, however, is typically owned and controlled by a single service provider, making it a single-point-of-failure. This paper presents Kosto - a framework that provisions a fair marketplace for secure outsourced computations, wherein the pool of computing resources aggregates resources offered by a large cohort of independent compute nodes. Kosto protects the confidentiality of clients' inputs as well as the integrity of the outsourced computations and their results using trusted hardware's enclave execution, in particular Intel SGX. Furthermore, Kosto warrants fair exchanges between the clients' payments for the execution of an outsourced computations and the compute nodes' work in servicing the clients' requests. Empirical evaluation on the prototype implementation of Kosto shows that performance overhead incurred by enclave execution is as small as 3% for computation-intensive operations, and 1.5x for IO-intensive operations.
△ Less
Submitted 29 August, 2018;
originally announced August 2018.
-
Safe Stream-Based Programming with Refinement Types
Authors:
Benno Stein,
Lazaro Clapp,
Manu Sridharan,
Bor-Yuh Evan Chang
Abstract:
In stream-based programming, data sources are abstracted as a stream of values that can be manipulated via callback functions. Stream-based programming is exploding in popularity, as it provides a powerful and expressive paradigm for handling asynchronous data sources in interactive software. However, high-level stream abstractions can also make it difficult for developers to reason about control-…
▽ More
In stream-based programming, data sources are abstracted as a stream of values that can be manipulated via callback functions. Stream-based programming is exploding in popularity, as it provides a powerful and expressive paradigm for handling asynchronous data sources in interactive software. However, high-level stream abstractions can also make it difficult for developers to reason about control- and data-flow relationships in their programs. This is particularly impactful when asynchronous stream-based code interacts with thread-limited features such as UI frameworks that restrict UI access to a single thread, since the threading behavior of streaming constructs is often non-intuitive and insufficiently documented.
In this paper, we present a type-based approach that can statically prove the thread-safety of UI accesses in stream-based software. Our key insight is that the fluent APIs of stream-processing frameworks enable the tracking of threads via type-refinement, making it possible to reason automatically about what thread a piece of code runs on -- a difficult problem in general.
We implement the system as an annotation-based Java typechecker for Android programs built upon the popular ReactiveX framework and evaluate its efficacy by annotating and analyzing 8 open-source apps, where we find 33 instances of unsafe UI access while incurring an annotation burden of only one annotation per 186 source lines of code. We also report on our experience applying the typechecker to two much larger apps from the Uber Technologies Inc. codebase, where it currently runs on every code change and blocks changes that introduce potential threading bugs.
△ Less
Submitted 8 August, 2018;
originally announced August 2018.
-
Critical open-system dynamics in a one-dimensional optical lattice clock
Authors:
Loïc Henriet,
James S. Douglas,
Darrick E. Chang,
Andreas Albrecht
Abstract:
There have been concerted efforts in recent years to realize the next generation of clocks using alkaline earth atoms in an optical lattice. Assuming that the atoms are independent, such a clock would benefit from a $\sqrt{N}$ enhancement in its stability, associated with the improved signal-to-noise ratio of a large atom number $N$. An interesting question, however, is what type of atomic interac…
▽ More
There have been concerted efforts in recent years to realize the next generation of clocks using alkaline earth atoms in an optical lattice. Assuming that the atoms are independent, such a clock would benefit from a $\sqrt{N}$ enhancement in its stability, associated with the improved signal-to-noise ratio of a large atom number $N$. An interesting question, however, is what type of atomic interactions might affect the clock dynamics, and whether these interactions are deleterious or could even be beneficial. In this work, we investigate the effect of dipole-dipole interactions, in which atoms excited during the clock protocol emit and re-absorb photons. Taking a simple system consisting of a 1D atomic array, we find that dipole-dipole interactions in fact result in an open quantum system exhibiting critical dynamics, as a set of collective excitations acquires a decay rate approaching zero in the thermodynamic limit due to subradiance. A first consequence is that the decay of atomic excited population at long times exhibits a slow power-law behavior, instead of the exponential expected for non-interacting atoms. We also find that excitations among the atoms exhibit fermionic spatial correlations at long times, due to the microscopic properties of the multi-excitation subradiant states. Interestingly, these properties cannot be captured by mean-field dynamics, suggesting the strongly interacting nature of this system. We finally characterize the time-dependent frequency shift in the atomic frequency measurement, and find that it is dominated by the interaction energy of subradiant states at long times. Furthermore, we show that the decay of the clock signal displays at long times a non-exponential behavior, which might be useful to improve the uncertainty limit with which the atomic frequency can be resolved.
△ Less
Submitted 1 February, 2019; v1 submitted 3 August, 2018;
originally announced August 2018.
-
Predicting breast tumor proliferation from whole-slide images: the TUPAC16 challenge
Authors:
Mitko Veta,
Yu**g J. Heng,
Nikolas Stathonikos,
Babak Ehteshami Bejnordi,
Francisco Beca,
Thomas Wollmann,
Karl Rohr,
Manan A. Shah,
Dayong Wang,
Mikael Rousson,
Martin Hedlund,
David Tellez,
Francesco Ciompi,
Erwan Zerhouni,
David Lanyi,
Matheus Viana,
Vassili Kovalev,
Vitali Liauchuk,
Hady Ahmady Phoulady,
Talha Qaiser,
Simon Graham,
Nasir Rajpoot,
Erik Sjöblom,
Jesper Molin,
Kyunghyun Paeng
, et al. (8 additional authors not shown)
Abstract:
Tumor proliferation is an important biomarker indicative of the prognosis of breast cancer patients. Assessment of tumor proliferation in a clinical setting is highly subjective and labor-intensive task. Previous efforts to automate tumor proliferation assessment by image analysis only focused on mitosis detection in predefined tumor regions. However, in a real-world scenario, automatic mitosis de…
▽ More
Tumor proliferation is an important biomarker indicative of the prognosis of breast cancer patients. Assessment of tumor proliferation in a clinical setting is highly subjective and labor-intensive task. Previous efforts to automate tumor proliferation assessment by image analysis only focused on mitosis detection in predefined tumor regions. However, in a real-world scenario, automatic mitosis detection should be performed in whole-slide images (WSIs) and an automatic method should be able to produce a tumor proliferation score given a WSI as input. To address this, we organized the TUmor Proliferation Assessment Challenge 2016 (TUPAC16) on prediction of tumor proliferation scores from WSIs. The challenge dataset consisted of 500 training and 321 testing breast cancer histopathology WSIs. In order to ensure fair and independent evaluation, only the ground truth for the training dataset was provided to the challenge participants. The first task of the challenge was to predict mitotic scores, i.e., to reproduce the manual method of assessing tumor proliferation by a pathologist. The second task was to predict the gene expression based PAM50 proliferation scores from the WSI. The best performing automatic method for the first task achieved a quadratic-weighted Cohen's kappa score of $κ$ = 0.567, 95% CI [0.464, 0.671] between the predicted scores and the ground truth. For the second task, the predictions of the top method had a Spearman's correlation coefficient of r = 0.617, 95% CI [0.581 0.651] with the ground truth. This was the first study that investigated tumor proliferation assessment from WSIs. The achieved results are promising given the difficulty of the tasks and weakly-labelled nature of the ground truth. However, further research is needed to improve the practical utility of image analysis methods for this task.
△ Less
Submitted 29 March, 2019; v1 submitted 22 July, 2018;
originally announced July 2018.
-
BRIEF: Backward Reduction of CNNs with Information Flow Analysis
Authors:
Yu-Hsun Lin,
Chun-Nan Chou,
Edward Y. Chang
Abstract:
This paper proposes BRIEF, a backward reduction algorithm that explores compact CNN-model designs from the information flow perspective. This algorithm can remove substantial non-zero weighting parameters (redundant neural channels) of a network by considering its dynamic behavior, which traditional model-compaction techniques cannot achieve. With the aid of our proposed algorithm, we achieve sign…
▽ More
This paper proposes BRIEF, a backward reduction algorithm that explores compact CNN-model designs from the information flow perspective. This algorithm can remove substantial non-zero weighting parameters (redundant neural channels) of a network by considering its dynamic behavior, which traditional model-compaction techniques cannot achieve. With the aid of our proposed algorithm, we achieve significant model reduction on ResNet-34 in the ImageNet scale (32.3% reduction), which is 3X better than the previous result (10.8%). Even for highly optimized models such as SqueezeNet and MobileNet, we can achieve additional 10.81% and 37.56% reduction, respectively, with negligible performance degradation.
△ Less
Submitted 31 October, 2018; v1 submitted 16 July, 2018;
originally announced July 2018.
-
On the Decomposition of Forces
Authors:
Dong Eui Chang
Abstract:
We show that any continuously differentiable force is decomposed into the sum of a Rayleigh force and a gyroscopic force. We also extend this result to piecewise continuously differentiable forces. Our result improves the result on the decomposition of forces in a book by David Merkin and further extends it to piecewise continuously differentiable forces.
We show that any continuously differentiable force is decomposed into the sum of a Rayleigh force and a gyroscopic force. We also extend this result to piecewise continuously differentiable forces. Our result improves the result on the decomposition of forces in a book by David Merkin and further extends it to piecewise continuously differentiable forces.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
On Controller Design for Systems on Manifolds in Euclidean Space
Authors:
Dong Eui Chang
Abstract:
A new method is developed to design controllers in Euclidean space for systems defined on manifolds. The idea is to embed the state-space manifold $M$ of a given control system into some Euclidean space $\mathbb R^n$, extend the system from $M$ to the ambient space $\mathbb R^n$, and modify it outside $M$ to add transversal stability to $M$ in the final dynamics in $\mathbb R^n$. Controllers are d…
▽ More
A new method is developed to design controllers in Euclidean space for systems defined on manifolds. The idea is to embed the state-space manifold $M$ of a given control system into some Euclidean space $\mathbb R^n$, extend the system from $M$ to the ambient space $\mathbb R^n$, and modify it outside $M$ to add transversal stability to $M$ in the final dynamics in $\mathbb R^n$. Controllers are designed for the final system in the ambient space $\mathbb R^n$. Then, their restriction to $M$ produces controllers for the original system on $M$. This method has the merit that only one single global Cartesian coordinate system in the ambient space $\mathbb R^n$ is used for controller synthesis, and any controller design method in $\mathbb R^n$, such as the linearization method, can be globally applied for the controller synthesis. The proposed method is successfully applied to the tracking problem for the following two benchmark systems: the fully actuated rigid body system and the quadcopter drone system.
△ Less
Submitted 10 July, 2018;
originally announced July 2018.
-
Observer-Based Controller Design for Systems on Manifolds in Euclidean Space
Authors:
Dong Eui Chang
Abstract:
A method of designing observers and observer-based tracking controllers is proposed for nonlinear systems on manifolds via embedding into Euclidean space and transversal stabilization. Given a system on a manifold, we first embed the manifold and the system into Euclidean space and extend the system dynamics to the ambient Euclidean space in such a way that the manifold becomes an invariant attrac…
▽ More
A method of designing observers and observer-based tracking controllers is proposed for nonlinear systems on manifolds via embedding into Euclidean space and transversal stabilization. Given a system on a manifold, we first embed the manifold and the system into Euclidean space and extend the system dynamics to the ambient Euclidean space in such a way that the manifold becomes an invariant attractor of the extended system, thus securing the transversal stability of the manifold in the extended dynamics. After the embedding, we design state observers and observer-based controllers for the extended system in one single global coordinate system in the ambient Euclidean space, and then restrict them to the original state-space manifold to produce observers and observer-based controllers for the original system on the manifold. This procedure has the merit that any existing control method that has been developed in Euclidean space can be applied globally to systems defined on nonlinear manifolds, thus making nonlinear controller design on manifolds easier. The detail of the method is demonstrated on the fully actuated rigid body system.
△ Less
Submitted 16 June, 2018;
originally announced June 2018.
-
Spiking Linear Dynamical Systems on Neuromorphic Hardware for Low-Power Brain-Machine Interfaces
Authors:
David G. Clark,
Jesse A. Livezey,
Edward F. Chang,
Kristofer E. Bouchard
Abstract:
Neuromorphic architectures achieve low-power operation by using many simple spiking neurons in lieu of traditional hardware. Here, we develop methods for precise linear computations in spiking neural networks and use these methods to map the evolution of a linear dynamical system (LDS) onto an existing neuromorphic chip: IBM's TrueNorth. We analytically characterize, and numerically validate, the…
▽ More
Neuromorphic architectures achieve low-power operation by using many simple spiking neurons in lieu of traditional hardware. Here, we develop methods for precise linear computations in spiking neural networks and use these methods to map the evolution of a linear dynamical system (LDS) onto an existing neuromorphic chip: IBM's TrueNorth. We analytically characterize, and numerically validate, the discrepancy between the spiking LDS state sequence and that of its non-spiking counterpart. These analytical results shed light on the multiway tradeoff between time, space, energy, and accuracy in neuromorphic computation. To demonstrate the utility of our work, we implemented a neuromorphic Kalman filter (KF) and used it for offline decoding of human vocal pitch from neural data. The neuromorphic KF could be used for low-power filtering in domains beyond neuroscience, such as navigation or robotics.
△ Less
Submitted 5 June, 2018; v1 submitted 22 May, 2018;
originally announced May 2018.
-
Holographic Entanglement Entropy in Boundary Quantum Field Theory
Authors:
En-Jui Chang,
Chia-Jui Chou,
Yi Yang
Abstract:
We study the holographic entanglement entropy in a (d+1)-dimensional boundary quantum field theory at both the zero and finite temperature. The phase diagrams for the holographic entanglement entropy at various temperatures are obtained by solving the entangled surfaces in the different homology. We also verify the Araki-Lieb inequality and illustrate the entanglement plateau.
We study the holographic entanglement entropy in a (d+1)-dimensional boundary quantum field theory at both the zero and finite temperature. The phase diagrams for the holographic entanglement entropy at various temperatures are obtained by solving the entangled surfaces in the different homology. We also verify the Araki-Lieb inequality and illustrate the entanglement plateau.
△ Less
Submitted 2 June, 2018; v1 submitted 15 May, 2018;
originally announced May 2018.
-
A Global, Continuous, and Exponentially Convergent Observer for Gyro Bias and Attitude of a Rigid Body
Authors:
Dong Eui Chang,
Taeyoung Lee
Abstract:
We propose a 12-dimensional, global, continuous, and exponentially convergent observer for gyro bias and attitude of a rigid body. Any attitude observer developed on the special orthogonal group suffers from the topological restriction that prohibits global attractivity in continuous flow. In this paper, the observer is designed in the set of 3 by 3 real matrices, thus making the topological obstr…
▽ More
We propose a 12-dimensional, global, continuous, and exponentially convergent observer for gyro bias and attitude of a rigid body. Any attitude observer developed on the special orthogonal group suffers from the topological restriction that prohibits global attractivity in continuous flow. In this paper, the observer is designed in the set of 3 by 3 real matrices, thus making the topological obstruction on the special orthogonal group irrelevant. The efficacy of the proposed approach against other attitude observers is illustrated by an indoor experiment utilizing visual landmarks.
△ Less
Submitted 23 September, 2019; v1 submitted 13 May, 2018;
originally announced May 2018.
-
Exploring unresolved sideband, optomechanical strong coupling using a single atom coupled to a cavity
Authors:
Lukas Neumeier,
Darrick E. Chang
Abstract:
A major trend within the field of cavity QED is to boost the interaction strength between the cavity field and the atomic internal degrees of freedom of the trapped atom by decreasing the mode volume of the cavity. In such systems, it is natural to achieve strong atom-cavity coupling, where the coherent interaction strength exceeds the cavity linewidth, while the linewidth exceeds the atomic trap…
▽ More
A major trend within the field of cavity QED is to boost the interaction strength between the cavity field and the atomic internal degrees of freedom of the trapped atom by decreasing the mode volume of the cavity. In such systems, it is natural to achieve strong atom-cavity coupling, where the coherent interaction strength exceeds the cavity linewidth, while the linewidth exceeds the atomic trap frequency. While most work focuses on coupling of photons to the internal degrees of freedom, additional rich dynamics can occur by considering the atomic motional degree of freedom as well. In particular, we show that such a system is a natural candidate to explore an interesting regime of quantum optomechanics, where the zero-point atomic motion yields a cavity frequency shift larger than its linewidth (so-called single-photon optomechanical strong coupling), but simultaneously where the motional frequency cannot be resolved by the cavity. We show that this regime can result in a number of remarkable phenomena, such as strong entanglement between the atomic wave-function and the scattering properties of single incident photons, or an anomalous mechanism where the atomic motion can significantly heat up due to single-photon scattering, even if the atom is trapped tightly within the Lamb-Dicke limit.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Towards Scaling Blockchain Systems via Sharding
Authors:
Hung Dang,
Tien Tuan Anh Dinh,
Dumitrel Loghin,
Ee-Chien Chang,
Qian Lin,
Beng Chin Ooi
Abstract:
Existing blockchain systems scale poorly because of their distributed consensus protocols. Current attempts at improving blockchain scalability are limited to cryptocurrency. Scaling blockchain systems under general workloads (i.e., non-cryptocurrency applications) remains an open question. In this work, we take a principled approach to apply sharding, which is a well-studied and proven technique…
▽ More
Existing blockchain systems scale poorly because of their distributed consensus protocols. Current attempts at improving blockchain scalability are limited to cryptocurrency. Scaling blockchain systems under general workloads (i.e., non-cryptocurrency applications) remains an open question. In this work, we take a principled approach to apply sharding, which is a well-studied and proven technique to scale out databases, to blockchain systems in order to improve their transaction throughput at scale. This is challenging, however, due to the fundamental difference in failure models between databases and blockchain. To achieve our goal, we first enhance the performance of Byzantine consensus protocols, by doing so we improve individual shards' throughput. Next, we design an efficient shard formation protocol that leverages a trusted random beacon to securely assign nodes into shards. We rely on trusted hardware, namely Intel SGX, to achieve high performance for both consensus and shard formation protocol. Third, we design a general distributed transaction protocol that ensures safety and liveness even when transaction coordinators are malicious. Finally, we conduct an extensive evaluation of our design both on a local cluster and on Google Cloud Platform. The results show that our consensus and shard formation protocols outperform state-of-the-art solutions at scale. More importantly, our sharded blockchain reaches a high throughput that can handle Visa-level workloads, and is the largest ever reported in a realistic environment.
△ Less
Submitted 12 March, 2019; v1 submitted 2 April, 2018;
originally announced April 2018.
-
Deep learning as a tool for neural data analysis: speech classification and cross-frequency coupling in human sensorimotor cortex
Authors:
Jesse A. Livezey,
Kristofer E. Bouchard,
Edward F. Chang
Abstract:
A fundamental challenge in neuroscience is to understand what structure in the world is represented in spatially distributed patterns of neural activity from multiple single-trial measurements. This is often accomplished by learning a simple, linear transformations between neural features and features of the sensory stimuli or motor task. While successful in some early sensory processing areas, li…
▽ More
A fundamental challenge in neuroscience is to understand what structure in the world is represented in spatially distributed patterns of neural activity from multiple single-trial measurements. This is often accomplished by learning a simple, linear transformations between neural features and features of the sensory stimuli or motor task. While successful in some early sensory processing areas, linear map**s are unlikely to be ideal tools for elucidating nonlinear, hierarchical representations of higher-order brain areas during complex tasks, such as the production of speech by humans. Here, we apply deep networks to predict produced speech syllables from cortical surface electric potentials recorded from human sensorimotor cortex. We found that deep networks had higher decoding prediction accuracy compared to baseline models, and also exhibited greater improvements in accuracy with increasing dataset size. We further demonstrate that deep network's confusions revealed hierarchical latent structure in the neural data, which recapitulated the underlying articulatory nature of speech motor control. Finally, we used deep networks to compare task-relevant information in different neural frequency bands, and found that the high-gamma band contains the vast majority of information relevant for the speech prediction task, with little-to-no additional contribution from lower-frequencies. Together, these results demonstrate the utility of deep networks as a data analysis tool for neuroscience.
△ Less
Submitted 26 March, 2018;
originally announced March 2018.
-
Subradiant states of quantum bits coupled to a one-dimensional waveguide
Authors:
Andreas Albrecht,
Loïc Henriet,
Ana Asenjo-Garcia,
Paul B. Dieterle,
Oskar Painter,
Darrick E. Chang
Abstract:
The properties of coupled emitters can differ dramatically from those of their individual constituents. Canonical examples include sub- and super-radiance, wherein the decay rate of a collective excitation is reduced or enhanced due to correlated interactions with the environment. Here, we systematically study the properties of collective excitations for regularly spaced arrays of quantum emitters…
▽ More
The properties of coupled emitters can differ dramatically from those of their individual constituents. Canonical examples include sub- and super-radiance, wherein the decay rate of a collective excitation is reduced or enhanced due to correlated interactions with the environment. Here, we systematically study the properties of collective excitations for regularly spaced arrays of quantum emitters coupled to a one-dimensional (1D) waveguide. We find that, for low excitation numbers, the modal properties are well-characterized by spin waves with a definite wavevector. Moreover, the decay rate of the most subradiant modes obeys a universal scaling with a cubic suppression in the number of emitters. Multi-excitation subradiant eigenstates can be built from fermionic combinations of single excitation eigenstates; such "fermionization" results in multiple excitations that spatially repel one another. We put forward a method to efficiently create and measure such subradiant states, which can be realized with superconducting qubits. These measurement protocols probe both real-space correlations (using on-site dispersive readout) and temporal correlations in the emitted field (using photon correlation techniques).
△ Less
Submitted 9 March, 2019; v1 submitted 6 March, 2018;
originally announced March 2018.
-
EA-CG: An Approximate Second-Order Method for Training Fully-Connected Neural Networks
Authors:
Sheng-Wei Chen,
Chun-Nan Chou,
Edward Y. Chang
Abstract:
For training fully-connected neural networks (FCNNs), we propose a practical approximate second-order method including: 1) an approximation of the Hessian matrix and 2) a conjugate gradient (CG) based method. Our proposed approximate Hessian matrix is memory-efficient and can be applied to any FCNNs where the activation and criterion functions are twice differentiable. We devise a CG-based method…
▽ More
For training fully-connected neural networks (FCNNs), we propose a practical approximate second-order method including: 1) an approximation of the Hessian matrix and 2) a conjugate gradient (CG) based method. Our proposed approximate Hessian matrix is memory-efficient and can be applied to any FCNNs where the activation and criterion functions are twice differentiable. We devise a CG-based method incorporating one-rank approximation to derive Newton directions for training FCNNs, which significantly reduces both space and time complexity. This CG-based method can be employed to solve any linear equation where the coefficient matrix is Kronecker-factored, symmetric and positive definite. Empirical studies show the efficacy and efficiency of our proposed method.
△ Less
Submitted 5 December, 2018; v1 submitted 18 February, 2018;
originally announced February 2018.
-
Flipped-Adversarial AutoEncoders
Authors:
Jiyi Zhang,
Hung Dang,
Hwee Kuan Lee,
Ee-Chien Chang
Abstract:
We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse map**" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes…
▽ More
We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse map**" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Experimental evaluations demonstrate that the proposed framework produces sharper reconstructed images while at the same time enabling inference that captures rich semantic representation of data.
△ Less
Submitted 3 April, 2018; v1 submitted 13 February, 2018;
originally announced February 2018.
-
MRI Cross-Modality NeuroImage-to-NeuroImage Translation
Authors:
Qianye Yang,
Nannan Li,
Zixu Zhao,
Xingyu Fan,
Eric I-Chao Chang,
Yan Xu
Abstract:
We present a cross-modality generation framework that learns to generate translated modalities from given modalities in MR images without real acquisition. Our proposed method performs NeuroImage-to-NeuroImage translation (abbreviated as N2N) by means of a deep learning model that leverages conditional generative adversarial networks (cGANs). Our framework jointly exploits the low-level features (…
▽ More
We present a cross-modality generation framework that learns to generate translated modalities from given modalities in MR images without real acquisition. Our proposed method performs NeuroImage-to-NeuroImage translation (abbreviated as N2N) by means of a deep learning model that leverages conditional generative adversarial networks (cGANs). Our framework jointly exploits the low-level features (pixel-wise information) and high-level representations (e.g. brain tumors, brain structure like gray matter, etc.) between cross modalities which are important for resolving the challenging complexity in brain structures. Our framework can serve as an auxiliary method in clinical diagnosis and has great application potential. Based on our proposed framework, we first propose a method for cross-modality registration by fusing the deformation fields to adopt the cross-modality information from translated modalities. Second, we propose an approach for MRI segmentation, translated multichannel segmentation (TMS), where given modalities, along with translated modalities, are segmented by fully convolutional networks (FCN) in a multichannel manner. Both of these two methods successfully adopt the cross-modality information to improve the performance without adding any extra data. Experiments demonstrate that our proposed framework advances the state-of-the-art on five brain MRI datasets. We also observe encouraging results in cross-modality registration and segmentation on some widely adopted brain datasets. Overall, our work can serve as an auxiliary method in clinical diagnosis and be applied to various tasks in medical fields.
Keywords: image-to-image, cross-modality, registration, segmentation, brain MRI
△ Less
Submitted 11 September, 2018; v1 submitted 21 January, 2018;
originally announced January 2018.
-
Nuclear modification of scalar, axial and tensor charges from lattice QCD
Authors:
Emmanuel Chang,
Zohreh Davoudi,
William Detmold,
Arjun S. Gambhir,
Kostas Orginos,
Martin J. Savage,
Phiala E. Shanahan,
Michael L. Wagman,
Frank Winter
Abstract:
Complete flavour decompositions of the scalar, axial and tensor charges of the proton, deuteron, diproton and $^3$He at SU(3)-symmetric values of the quark masses corresponding to a pion mass $m_π\sim806$ MeV are determined using lattice QCD. At the physical quark masses, the scalar charges constrain mean-field models of nuclei and the low-energy interactions of nuclei with potential dark matter c…
▽ More
Complete flavour decompositions of the scalar, axial and tensor charges of the proton, deuteron, diproton and $^3$He at SU(3)-symmetric values of the quark masses corresponding to a pion mass $m_π\sim806$ MeV are determined using lattice QCD. At the physical quark masses, the scalar charges constrain mean-field models of nuclei and the low-energy interactions of nuclei with potential dark matter candidates. The axial and tensor charges of nuclei constrain their spin content, integrated transversity and the quark contributions to their electric dipole moments. External fields are used to directly access the quark-line connected matrix elements of quark bilinear operators, and a combination of stochastic estimation techniques is used to determine the disconnected sea-quark contributions. Significant nuclear modifications are found, with particularly large, O(10%), effects in the scalar charges. Typically, these nuclear effects reduce the effective charge of the nucleon (quenching), although in some cases an enhancement is not excluded. Given the size of the nuclear modifications of the scalar charges resolved here, contributions from correlated multi-nucleon effects should be quantified in the analysis of dark matter direct-detection experiments using nuclear targets.
△ Less
Submitted 13 May, 2018; v1 submitted 8 December, 2017;
originally announced December 2017.