-
Dual-stage Hyperspectral Image Classification Model with Spectral Supertoken
Authors:
Peifu Liu,
Tingfa Xu,
Jie Wang,
Huan Chen,
Huiyan Bai,
Jianan Li
Abstract:
Hyperspectral image classification, a task that assigns pre-defined classes to each pixel in a hyperspectral image of remote sensing scenes, often faces challenges due to the neglect of correlations between spectrally similar pixels. This oversight can lead to inaccurate edge definitions and difficulties in managing minor spectral variations in contiguous areas. To address these issues, we introdu…
▽ More
Hyperspectral image classification, a task that assigns pre-defined classes to each pixel in a hyperspectral image of remote sensing scenes, often faces challenges due to the neglect of correlations between spectrally similar pixels. This oversight can lead to inaccurate edge definitions and difficulties in managing minor spectral variations in contiguous areas. To address these issues, we introduce the novel Dual-stage Spectral Supertoken Classifier (DSTC), inspired by superpixel concepts. DSTC employs spectrum-derivative-based pixel clustering to group pixels with similar spectral characteristics into spectral supertokens. By projecting the classification of these tokens onto the image space, we achieve pixel-level results that maintain regional classification consistency and precise boundary. Moreover, recognizing the diversity within tokens, we propose a class-proportion-based soft label. This label adaptively assigns weights to different categories based on their prevalence, effectively managing data distribution imbalances and enhancing classification performance. Comprehensive experiments on WHU-OHS, IP, KSC, and UP datasets corroborate the robust classification capabilities of DSTC and the effectiveness of its individual components. Code will be publicly available at https://github.com/laprf/DSTC.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Electrical Impedance Tomography Based Closed-loop Tumor Treating Fields in Dynamic Lung Tumors
Authors:
Minmin Wang,
Xu Xie,
Yuxi Guo,
Liying Zhu,
Yue Lan,
Haitang Yang,
Yun Pan,
Guangdi Chen,
Shaomin Zhang,
Maomao Zhang
Abstract:
Tumor Treating Fields (TTFields) is a non-invasive anticancer modality that utilizes alternating electric fields to disrupt cancer cell division and growth. While generally well-tolerated with minimal side effects, traditional TTFields therapy for lung tumors faces challenges due to the influence of respiratory motion. We design a novel closed-loop TTFields strategy for lung tumors by incorporatin…
▽ More
Tumor Treating Fields (TTFields) is a non-invasive anticancer modality that utilizes alternating electric fields to disrupt cancer cell division and growth. While generally well-tolerated with minimal side effects, traditional TTFields therapy for lung tumors faces challenges due to the influence of respiratory motion. We design a novel closed-loop TTFields strategy for lung tumors by incorporating electrical impedance tomography (EIT) for real-time respiratory phase monitoring and dynamic parameter adjustments. Furthermore, we conduct theoretical analysis to evaluate the performance of the proposed method using the lung motion model. Compared to conventional TTFields settings, we observed that variations in the electrical conductivity of lung during different respiratory phases led to a decrease in the average electric field intensity within lung tumors, transitioning from end-expiratory (1.08 V/cm) to end-inspiratory (0.87 V/cm) phases. Utilizing our proposed closed-Loop TTFields approach at the same dose setting (2400 mA, consistent with the traditional TTFields setting), we can achieve a higher and consistent average electric field strength at the tumor site (1.30 V/cm) across different respiratory stages. Our proposed closed-loop TTFields method has the potential to improved lung tumor therapy by mitigating the impact of respiratory motion.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Inference Performance Optimization for Large Language Models on CPUs
Authors:
Pujiang He,
Shan Zhou,
Wenhuan Huang,
Changqing Li,
Duyi Wang,
Bin Guo,
Chen Meng,
Sheng Gui,
Weifei Yu,
Yi Xie
Abstract:
Large language models (LLMs) have shown exceptional performance and vast potential across diverse tasks. However, the deployment of LLMs with high performance in low-resource environments has garnered significant attention in the industry. When GPU hardware resources are limited, we can explore alternative options on CPUs. To mitigate the financial burden and alleviate constraints imposed by hardw…
▽ More
Large language models (LLMs) have shown exceptional performance and vast potential across diverse tasks. However, the deployment of LLMs with high performance in low-resource environments has garnered significant attention in the industry. When GPU hardware resources are limited, we can explore alternative options on CPUs. To mitigate the financial burden and alleviate constraints imposed by hardware resources, optimizing inference performance is necessary. In this paper, we introduce an easily deployable inference performance optimization solution aimed at accelerating LLMs on CPUs. In this solution, we implement an effective way to reduce the KV cache size while ensuring precision. We propose a distributed inference optimization approach and implement it based on oneAPI Collective Communications Library. Furthermore, we propose optimization approaches for LLMs on CPU, and conduct tailored optimizations for the most commonly used models. The code is open-sourced at https://github.com/intel/xFasterTransformer.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Exploring Camera Encoder Designs for Autonomous Driving Perception
Authors:
Barath Lakshmanan,
Joshua Chen,
Shiyi Lan,
Maying Shen,
Zhiding Yu,
Jose M. Alvarez
Abstract:
The cornerstone of autonomous vehicles (AV) is a solid perception system, where camera encoders play a crucial role. Existing works usually leverage pre-trained Convolutional Neural Networks (CNN) or Vision Transformers (ViTs) designed for general vision tasks, such as image classification, segmentation, and 2D detection. Although those well-known architectures have achieved state-of-the-art accur…
▽ More
The cornerstone of autonomous vehicles (AV) is a solid perception system, where camera encoders play a crucial role. Existing works usually leverage pre-trained Convolutional Neural Networks (CNN) or Vision Transformers (ViTs) designed for general vision tasks, such as image classification, segmentation, and 2D detection. Although those well-known architectures have achieved state-of-the-art accuracy in AV-related tasks, e.g., 3D Object Detection, there remains significant potential for improvement in network design due to the nuanced complexities of industrial-level AV dataset. Moreover, existing public AV benchmarks usually contain insufficient data, which might lead to inaccurate evaluation of those architectures.To reveal the AV-specific model insights, we start from a standard general-purpose encoder, ConvNeXt and progressively transform the design. We adjust different design parameters including width and depth of the model, stage compute ratio, attention mechanisms, and input resolution, supported by systematic analysis to each modifications. This customization yields an architecture optimized for AV camera encoder achieving 8.79% mAP improvement over the baseline. We believe our effort could become a sweet cookbook of image encoders for AV and pave the way to the next-level drive system.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Analytic Solution for the Linear Rheology of Living Polymers
Authors:
Vickie Chen,
Charles T. Drucker,
Claire Love,
Jonathon Peterson,
Joseph Peterson
Abstract:
It is often said that well-entangled and fast-breaking living polymers (such as wormlike micelles) exhibit a single relaxation time in their reptation dynamics, but the full story is somewhat more complicated. Understanding departures from single-Maxwell behavior is crucial for fitting and interpreting experimental data, but in some limiting cases numerical methods of solving living polymer models…
▽ More
It is often said that well-entangled and fast-breaking living polymers (such as wormlike micelles) exhibit a single relaxation time in their reptation dynamics, but the full story is somewhat more complicated. Understanding departures from single-Maxwell behavior is crucial for fitting and interpreting experimental data, but in some limiting cases numerical methods of solving living polymer models can struggle to produce reliable predictions/interpretations. In this work, we develop an analytic solution for the shuffling model of living polymers. The analytic solution is a converging infinite series, and it converges fastest in the fast-breaking limit where other methods can struggle.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
ItTakesTwo: Leveraging Peer Representations for Semi-supervised LiDAR Semantic Segmentation
Authors:
Yuyuan Liu,
Yuanhong Chen,
Hu Wang,
Vasileios Belagiannis,
Ian Reid,
Gustavo Carneiro
Abstract:
The costly and time-consuming annotation process to produce large training sets for modelling semantic LiDAR segmentation methods has motivated the development of semi-supervised learning (SSL) methods. However, such SSL approaches often concentrate on employing consistency learning only for individual LiDAR representations. This narrow focus results in limited perturbations that generally fail to…
▽ More
The costly and time-consuming annotation process to produce large training sets for modelling semantic LiDAR segmentation methods has motivated the development of semi-supervised learning (SSL) methods. However, such SSL approaches often concentrate on employing consistency learning only for individual LiDAR representations. This narrow focus results in limited perturbations that generally fail to enable effective consistency learning. Additionally, these SSL approaches employ contrastive learning based on the sampling from a limited set of positive and negative embedding samples. This paper introduces a novel semi-supervised LiDAR semantic segmentation framework called ItTakesTwo (IT2). IT2 is designed to ensure consistent predictions from peer LiDAR representations, thereby improving the perturbation effectiveness in consistency learning. Furthermore, our contrastive learning employs informative samples drawn from a distribution of positive and negative embeddings learned from the entire training set. Results on public benchmarks show that our approach achieves remarkable improvements over the previous state-of-the-art (SOTA) methods in the field. The code is available at: https://github.com/yyliu01/IT2.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Across the soft gamma-ray regime: utilizing simultaneous detections in the Compton Spectrometer and Imager (COSI) and the Background and Transient Observer (BTO) to understand astrophysical transients
Authors:
Hannah C. Gulick,
Eliza Neights,
Samer Al Nussirat,
Claire Tianyi Chen,
Kaylie Ching,
Cassandra Dove,
Alyson Joens,
Carolyn Kierans,
Hubert Liu,
Israel Martinez,
Romas Mician,
Shunsaku Nagasawa,
Shreya Nandyala,
Isabel Schmidtke,
Derek Shah,
Andreas Zoglauer,
Kazuhiro Nakasawa,
Tadayuki Takahashi,
Juan-Carlos Martinez Oliveros,
John A. Tomsick
Abstract:
The Compton Spectrometer and Imager (COSI) is a NASA funded Small Explorer (SMEX) mission slated to launch in 2027. COSI will house a wide-field gamma-ray telescope designed to survey the entire sky in the 0.2--5 MeV range. Using germanium detectors, the instrument will provide imaging, spectroscopy, and polarimetry of astrophysical sources with excellent energy resolution and degree-scale localiz…
▽ More
The Compton Spectrometer and Imager (COSI) is a NASA funded Small Explorer (SMEX) mission slated to launch in 2027. COSI will house a wide-field gamma-ray telescope designed to survey the entire sky in the 0.2--5 MeV range. Using germanium detectors, the instrument will provide imaging, spectroscopy, and polarimetry of astrophysical sources with excellent energy resolution and degree-scale localization capabilities. In addition to the main instrument, COSI will fly with a student collaboration project known as the Background and Transient Observer (BTO). BTO will extend the COSI bandpass to energies lower than 200 keV, thus enabling spectral analysis across the shared band of 30 keV--2 MeV range. The BTO instrument will consist of two NaI scintillators and student-designed readout electronics. Using spectral information from both the COSI and BTO instruments, physics such as the energy peak turnover in gamma-ray bursts, the characteristics of magnetar flares, and the event frequency of a range of transient phenomena will be constrained. In this paper, we present the expected science returnables from BTO and comment on the shared returnables from the COSI and BTO missions. We include simulations of gamma-ray bursts, magnetar giant flares, and terrestrial gamma-ray flashes using BTO's spectral response. Additionally, we estimate BTO's gamma-ray burst detection rate and find that BTO will detect ~150 gamma-ray bursts per year, with most of these events being long bursts.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
The neutron star mass, distance, and inclination from precision timing of the brilliant millisecond pulsar J0437$-$4715
Authors:
Daniel J. Reardon,
Matthew Bailes,
Ryan M. Shannon,
Chris Flynn,
Jacob Askew,
N. D. Ramesh Bhat,
Zu-Cheng Chen,
Małgorzata Curyło,
Yi Feng,
George B. Hobbs,
Agastya Kapur,
Matthew Kerr,
Xiao** Liu,
Richard N. Manchester,
Rami Mandow,
Saurav Mishra,
Christopher J. Russell,
Mohsen Shamohammadi,
Lei Zhang,
Andrew Zic
Abstract:
The observation of neutron stars enables the otherwise impossible study of fundamental physical processes. Timing of binary radio pulsars is particularly powerful, as it enables precise characterization of their (three-dimensional) positions and orbits. PSR J0437$-$4715 is an important millisecond pulsar for timing array experiments and is also a primary target for the Neutron Star Interior Compos…
▽ More
The observation of neutron stars enables the otherwise impossible study of fundamental physical processes. Timing of binary radio pulsars is particularly powerful, as it enables precise characterization of their (three-dimensional) positions and orbits. PSR J0437$-$4715 is an important millisecond pulsar for timing array experiments and is also a primary target for the Neutron Star Interior Composition ExploreR (NICER). The main aim of the NICER mission is to constrain the neutron star equation of state by inferring the compactness ($M_p/R$) of the star. Direct measurements of the mass $M_p$ from pulsar timing therefore substantially improve constraints on the radius $R$, and the equation of state. Here we use observations spanning 26 years from Murriyang, the 64-m Parkes radio telescope, to improve the timing model for this pulsar. Among the new precise measurements are the pulsar mass $M_p=1.418\pm 0.044$ M$_{\odot}$, distance $D=156.96 \pm 0.11$ pc, and orbital inclination angle $i=137.506 \pm 0.016^\circ$, which can be used to inform the X-ray pulse profile models inferred from NICER observations. We demonstrate that these results are consistent between multiple data sets from the Parkes Pulsar Timing Array (PPTA), each modelled with different noise assumptions. Using the longest available PPTA data set, we measure an apparent second derivative of the pulsar spin frequency and discuss how this can be explained either by kinematic effects due to the proper motion and radial velocity of the pulsar, or excess low-frequency noise such as a gravitational-wave background.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
FedClust: Tackling Data Heterogeneity in Federated Learning through Weight-Driven Client Clustering
Authors:
Md Sirajul Islam,
Simin Javaherian,
Fei Xu,
Xu Yuan,
Li Chen,
Nian-Feng Tzeng
Abstract:
Federated learning (FL) is an emerging distributed machine learning paradigm that enables collaborative training of machine learning models over decentralized devices without exposing their local data. One of the major challenges in FL is the presence of uneven data distributions across client devices, violating the well-known assumption of independent-and-identically-distributed (IID) training sa…
▽ More
Federated learning (FL) is an emerging distributed machine learning paradigm that enables collaborative training of machine learning models over decentralized devices without exposing their local data. One of the major challenges in FL is the presence of uneven data distributions across client devices, violating the well-known assumption of independent-and-identically-distributed (IID) training samples in conventional machine learning. To address the performance degradation issue incurred by such data heterogeneity, clustered federated learning (CFL) shows its promise by grou** clients into separate learning clusters based on the similarity of their local data distributions. However, state-of-the-art CFL approaches require a large number of communication rounds to learn the distribution similarities during training until the formation of clusters is stabilized. Moreover, some of these algorithms heavily rely on a predefined number of clusters, thus limiting their flexibility and adaptability. In this paper, we propose {\em FedClust}, a novel approach for CFL that leverages the correlation between local model weights and the data distribution of clients. {\em FedClust} groups clients into clusters in a one-shot manner by measuring the similarity degrees among clients based on the strategically selected partial weights of locally trained models. We conduct extensive experiments on four benchmark datasets with different non-IID data settings. Experimental results demonstrate that {\em FedClust} achieves higher model accuracy up to $\sim$45\% as well as faster convergence with a significantly reduced communication cost up to 2.7$\times$ compared to its state-of-the-art counterparts.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Congruences modulo powers of $5$ and $7$ for the crank and rank parity functions and related mock theta functions
Authors:
Dandan Chen,
Rong Chen,
Frank Garvan
Abstract:
It is well known that Ramanujan conjectured congruences modulo powers of $5$, $7$ and and $11$ for the partition function. These were subsequently proved by Watson (1938) and Atkin (1967). In 2009 Choi, Kang, and Lovejoy proved congruences modulo powers of $5$ for the crank parity function. The generating function for the analogous rank parity function is $f(q)$, the first example of a mock theta…
▽ More
It is well known that Ramanujan conjectured congruences modulo powers of $5$, $7$ and and $11$ for the partition function. These were subsequently proved by Watson (1938) and Atkin (1967). In 2009 Choi, Kang, and Lovejoy proved congruences modulo powers of $5$ for the crank parity function. The generating function for the analogous rank parity function is $f(q)$, the first example of a mock theta function that Ramanujan mentioned in his last letter to Hardy. Recently we proved congruences modulo powers of $5$ for the rank parity function, and here we extend these congruences for powers of $7$. We also show how these congruences imply congruences modulo powers of $5$ and $7$ for the coefficients of the related third order mock theta function $ω(q)$, using Atkin-Lehner involutions and transformation results of Zwegers. Finally we a prove a family of congruences modulo powers of $7$ for the crank parity function.
△ Less
Submitted 24 June, 2024;
originally announced July 2024.
-
CopyBench: Measuring Literal and Non-Literal Reproduction of Copyright-Protected Text in Language Model Generation
Authors:
Tong Chen,
Akari Asai,
Niloofar Mireshghallah,
Sewon Min,
James Grimmelmann,
Ye** Choi,
Hannaneh Hajishirzi,
Luke Zettlemoyer,
Pang Wei Koh
Abstract:
Evaluating the degree of reproduction of copyright-protected content by language models (LMs) is of significant interest to the AI and legal communities. Although both literal and non-literal similarities are considered by courts when assessing the degree of reproduction, prior research has focused only on literal similarities. To bridge this gap, we introduce CopyBench, a benchmark designed to me…
▽ More
Evaluating the degree of reproduction of copyright-protected content by language models (LMs) is of significant interest to the AI and legal communities. Although both literal and non-literal similarities are considered by courts when assessing the degree of reproduction, prior research has focused only on literal similarities. To bridge this gap, we introduce CopyBench, a benchmark designed to measure both literal and non-literal copying in LM generations. Using copyrighted fiction books as text sources, we provide automatic evaluation protocols to assess literal and non-literal copying, balanced against the model utility in terms of the ability to recall facts from the copyrighted works and generate fluent completions. We find that, although literal copying is relatively rare, two types of non-literal copying -- event copying and character copying -- occur even in models as small as 7B parameters. Larger models demonstrate significantly more copying, with literal copying rates increasing from 0.2% to 10.5% and non-literal copying from 2.3% to 6.9% when comparing Llama3-8B and 70B models, respectively. We further evaluate the effectiveness of current strategies for mitigating copying and show that (1) training-time alignment can reduce literal copying but may increase non-literal copying, and (2) current inference-time mitigation methods primarily reduce literal but not non-literal copying.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Internet of Agents: Weaving a Web of Heterogeneous Agents for Collaborative Intelligence
Authors:
Weize Chen,
Ziming You,
Ran Li,
Yitong Guan,
Chen Qian,
Chenyang Zhao,
Cheng Yang,
Ruobing Xie,
Zhiyuan Liu,
Maosong Sun
Abstract:
The rapid advancement of large language models (LLMs) has paved the way for the development of highly capable autonomous agents. However, existing multi-agent frameworks often struggle with integrating diverse capable third-party agents due to reliance on agents defined within their own ecosystems. They also face challenges in simulating distributed environments, as most frameworks are limited to…
▽ More
The rapid advancement of large language models (LLMs) has paved the way for the development of highly capable autonomous agents. However, existing multi-agent frameworks often struggle with integrating diverse capable third-party agents due to reliance on agents defined within their own ecosystems. They also face challenges in simulating distributed environments, as most frameworks are limited to single-device setups. Furthermore, these frameworks often rely on hard-coded communication pipelines, limiting their adaptability to dynamic task requirements. Inspired by the concept of the Internet, we propose the Internet of Agents (IoA), a novel framework that addresses these limitations by providing a flexible and scalable platform for LLM-based multi-agent collaboration. IoA introduces an agent integration protocol, an instant-messaging-like architecture design, and dynamic mechanisms for agent teaming and conversation flow control. Through extensive experiments on general assistant tasks, embodied AI tasks, and retrieval-augmented generation benchmarks, we demonstrate that IoA consistently outperforms state-of-the-art baselines, showcasing its ability to facilitate effective collaboration among heterogeneous agents. IoA represents a step towards linking diverse agents in an Internet-like environment, where agents can seamlessly collaborate to achieve greater intelligence and capabilities. Our codebase has been released at \url{https://github.com/OpenBMB/IoA}.
△ Less
Submitted 10 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
The curvature dependence of gravitational-wave tests of General Relativity
Authors:
Ethan Payne,
Maximiliano Isi,
Katerina Chatziioannou,
Luis Lehner,
Yanbei Chen,
Will M. Farr
Abstract:
High-energy extensions to General Relativity modify the Einstein-Hilbert action with higher-order curvature corrections and theory-specific coupling constants. The order of these corrections imprints a universal curvature dependence on observations while the coupling constant controls the deviation strength. In this Letter, we leverage the theory-independent expectation that modifications to the a…
▽ More
High-energy extensions to General Relativity modify the Einstein-Hilbert action with higher-order curvature corrections and theory-specific coupling constants. The order of these corrections imprints a universal curvature dependence on observations while the coupling constant controls the deviation strength. In this Letter, we leverage the theory-independent expectation that modifications to the action of a given order in spacetime curvature (Riemann tensor and contractions) lead to observational deviations that scale with the system length-scale to a corresponding power. Focusing on gravitational wave observations, the relevant scale is the binary total mass, and deviations scale as a power of mass $p$ related to the action order. For example, $p=4,6$ arise in effective field theory for cubic and quartic theories respectively. We incorporate this universal scaling into theory-agnostic tests of General Relativity with current gravitational-wave observations, thus enabling constraints on the curvature scaling without compromising the agnostic nature of these tests. This introduces a flexible yet highly interpretable new paradigm for tests of General Relativity with gravitational-wave catalogs.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Shadows, greybody factors, emission rate, topological charge, and phase transitions for a charged black hole with a Kalb-Ramond field background
Authors:
F. Hosseinifar,
A. A. Araújo Filho,
M. Y. Zhang,
H. Chen,
H. Hassanabadi
Abstract:
In this work, we investigate a spherically symmetric charged black hole in the presence of a Kalb--Ramond field background. We calculate the photon sphere and shadow radii and, corroborating our results, we constrain them from observational data from the Event Horizon Telescope (EHT), particularly focusing on the shadow images of Sagittarius $A^{*}$. Additionally, we analyze the greybody factors,…
▽ More
In this work, we investigate a spherically symmetric charged black hole in the presence of a Kalb--Ramond field background. We calculate the photon sphere and shadow radii and, corroborating our results, we constrain them from observational data from the Event Horizon Telescope (EHT), particularly focusing on the shadow images of Sagittarius $A^{*}$. Additionally, we analyze the greybody factors, emission rate, and partial absorption cross section. We also examine the topological charge and its application to the deflection angle. Finally, we conduct the analysis of the heat capacity and phase transitions.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
PEER: Expertizing Domain-Specific Tasks with a Multi-Agent Framework and Tuning Methods
Authors:
Yiying Wang,
Xiao**g Li,
Binzhu Wang,
Yueyang Zhou,
Han Ji,
Hong Chen,
**shi Zhang,
Fei Yu,
Zewei Zhao,
Song **,
Renji Gong,
Wanqing Xu
Abstract:
In domain-specific applications, GPT-4, augmented with precise prompts or Retrieval-Augmented Generation (RAG), shows notable potential but faces the critical tri-lemma of performance, cost, and data privacy. High performance requires sophisticated processing techniques, yet managing multiple agents within a complex workflow often proves costly and challenging. To address this, we introduce the PE…
▽ More
In domain-specific applications, GPT-4, augmented with precise prompts or Retrieval-Augmented Generation (RAG), shows notable potential but faces the critical tri-lemma of performance, cost, and data privacy. High performance requires sophisticated processing techniques, yet managing multiple agents within a complex workflow often proves costly and challenging. To address this, we introduce the PEER (Plan, Execute, Express, Review) multi-agent framework. This systematizes domain-specific tasks by integrating precise question decomposition, advanced information retrieval, comprehensive summarization, and rigorous self-assessment. Given the concerns of cost and data privacy, enterprises are shifting from proprietary models like GPT-4 to custom models, striking a balance between cost, security, and performance. We developed industrial practices leveraging online data and user feedback for efficient model tuning. This study provides best practice guidelines for applying multi-agent systems in domain-specific problem-solving and implementing effective agent tuning strategies. Our empirical studies, particularly in the financial question-answering domain, demonstrate that our approach achieves 95.0% of GPT-4's performance, while effectively managing costs and ensuring data privacy.
△ Less
Submitted 9 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
Oscillatory integral operators and variable Schrödinger propagators: beyond the universal estimates
Authors:
Mingfeng Chen,
Shengwen Gan,
Shaoming Guo,
Jonathan Hickman,
Marina Iliopoulou,
James Wright
Abstract:
We consider a class of Hörmander-type oscillatory integral operators in $\mathbb{R}^n$ for $n \geq 3$ odd with real analytic phase. We derive weak conditions on the phase which ensure $L^p$ bounds beyond the universal $p \geq 2 \cdot \frac{n+1}{n-1}$ range guaranteed by Stein's oscillatory integral theorem. This expands and elucidates pioneering work of Bourgain from the early 1990s. We also consi…
▽ More
We consider a class of Hörmander-type oscillatory integral operators in $\mathbb{R}^n$ for $n \geq 3$ odd with real analytic phase. We derive weak conditions on the phase which ensure $L^p$ bounds beyond the universal $p \geq 2 \cdot \frac{n+1}{n-1}$ range guaranteed by Stein's oscillatory integral theorem. This expands and elucidates pioneering work of Bourgain from the early 1990s. We also consider a closely related class of variable coefficient Schrödinger propagator-type operators, and show that the corresponding theory differs significantly from that of the Hörmander-type operators. The main ingredient in the proof is a curved Kakeya/Nikodym maximal function estimate. This is established by combining the polynomial method with certain uniform sublevel set estimates for real analytic functions. The sublevel set estimates are the main novelty in the argument and can be interpreted as a form of quantification of linear independence in the $C^ω$ category.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Listen and Speak Fairly: A Study on Semantic Gender Bias in Speech Integrated Large Language Models
Authors:
Yi-Cheng Lin,
Tzu-Quan Lin,
Chih-Kai Yang,
Ke-Han Lu,
Wei-Chih Chen,
Chun-Yi Kuan,
Hung-yi Lee
Abstract:
Speech Integrated Large Language Models (SILLMs) combine large language models with speech perception to perform diverse tasks, such as emotion recognition to speaker verification, demonstrating universal audio understanding capability. However, these models may amplify biases present in training data, potentially leading to biased access to information for marginalized groups. This work introduce…
▽ More
Speech Integrated Large Language Models (SILLMs) combine large language models with speech perception to perform diverse tasks, such as emotion recognition to speaker verification, demonstrating universal audio understanding capability. However, these models may amplify biases present in training data, potentially leading to biased access to information for marginalized groups. This work introduces a curated spoken bias evaluation toolkit and corresponding dataset. We evaluate gender bias in SILLMs across four semantic-related tasks: speech-to-text translation (STT), spoken coreference resolution (SCR), spoken sentence continuation (SSC), and spoken question answering (SQA). Our analysis reveals that bias levels are language-dependent and vary with different evaluation methods. Our findings emphasize the necessity of employing multiple approaches to comprehensively assess biases in SILLMs, providing insights for develo** fairer SILLM systems.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
RodinHD: High-Fidelity 3D Avatar Generation with Diffusion Models
Authors:
Bowen Zhang,
Yiji Cheng,
Chunyu Wang,
Ting Zhang,
Jiaolong Yang,
Yansong Tang,
Feng Zhao,
Dong Chen,
Baining Guo
Abstract:
We present RodinHD, which can generate high-fidelity 3D avatars from a portrait image. Existing methods fail to capture intricate details such as hairstyles which we tackle in this paper. We first identify an overlooked problem of catastrophic forgetting that arises when fitting triplanes sequentially on many avatars, caused by the MLP decoder sharing scheme. To overcome this issue, we raise a nov…
▽ More
We present RodinHD, which can generate high-fidelity 3D avatars from a portrait image. Existing methods fail to capture intricate details such as hairstyles which we tackle in this paper. We first identify an overlooked problem of catastrophic forgetting that arises when fitting triplanes sequentially on many avatars, caused by the MLP decoder sharing scheme. To overcome this issue, we raise a novel data scheduling strategy and a weight consolidation regularization term, which improves the decoder's capability of rendering sharper details. Additionally, we optimize the guiding effect of the portrait image by computing a finer-grained hierarchical representation that captures rich 2D texture cues, and injecting them to the 3D diffusion model at multiple layers via cross-attention. When trained on 46K avatars with a noise schedule optimized for triplanes, the resulting model can generate 3D avatars with notably better details than previous methods and can generalize to in-the-wild portrait input.
△ Less
Submitted 10 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
Blowing-up solutions for the Choquard type Brezis-Nirenberg problem in dimension three
Authors:
Wen**g Chen,
Zexi Wang
Abstract:
In this paper, we are interested in the existence of solutions for the following Choquard type Brezis-Nirenberg problem \begin{align*}
\left\{
\begin{array}{ll}
-Δu=\displaystyle\Big(\int\limits_Ω\frac{u^{6-α}(y)}{|x-y|^α}dy\Big)u^{5-α}+λu,
\ \ &\mbox{in}\ Ω,
u=0,
\ \ &\mbox{on}\ \partial Ω,
\end{array}
\right.
\end{align*} where $Ω$ is a smooth bounded domain in $\mathbb{R}^3$,…
▽ More
In this paper, we are interested in the existence of solutions for the following Choquard type Brezis-Nirenberg problem \begin{align*}
\left\{
\begin{array}{ll}
-Δu=\displaystyle\Big(\int\limits_Ω\frac{u^{6-α}(y)}{|x-y|^α}dy\Big)u^{5-α}+λu,
\ \ &\mbox{in}\ Ω,
u=0,
\ \ &\mbox{on}\ \partial Ω,
\end{array}
\right.
\end{align*} where $Ω$ is a smooth bounded domain in $\mathbb{R}^3$, $α\in (0,3)$, $6-α$ is the upper critical exponent in the sense of the Hardy-Littlewood-Sobolev inequality, and $λ$ is a real positive parameter. By applying the reduction argument, we find and characterize a positive value $λ_0$ such that if $λ-λ_0>0$ is small enough, then the above problem admits a solution, which blows up and concentrates at the critical point of the Robin function as $λ\rightarrow λ_0$. Moreover, we consider the above problem under zero Neumann boundary condition.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Aligning Cyber Space with Physical World: A Comprehensive Survey on Embodied AI
Authors:
Yang Liu,
Weixing Chen,
Yongjie Bai,
**gzhou Luo,
Xinshuai Song,
Kaixuan Jiang,
Zhida Li,
Ganlong Zhao,
Junyi Lin,
Guanbin Li,
Wen Gao,
Liang Lin
Abstract:
Embodied Artificial Intelligence (Embodied AI) is crucial for achieving Artificial General Intelligence (AGI) and serves as a foundation for various applications that bridge cyberspace and the physical world. Recently, the emergence of Multi-modal Large Models (MLMs) and World Models (WMs) have attracted significant attention due to their remarkable perception, interaction, and reasoning capabilit…
▽ More
Embodied Artificial Intelligence (Embodied AI) is crucial for achieving Artificial General Intelligence (AGI) and serves as a foundation for various applications that bridge cyberspace and the physical world. Recently, the emergence of Multi-modal Large Models (MLMs) and World Models (WMs) have attracted significant attention due to their remarkable perception, interaction, and reasoning capabilities, making them a promising architecture for the brain of embodied agents. However, there is no comprehensive survey for Embodied AI in the era of MLMs. In this survey, we give a comprehensive exploration of the latest advancements in Embodied AI. Our analysis firstly navigates through the forefront of representative works of embodied robots and simulators, to fully understand the research focuses and their limitations. Then, we analyze four main research targets: 1) embodied perception, 2) embodied interaction, 3) embodied agent, and 4) sim-to-real adaptation, covering the state-of-the-art methods, essential paradigms, and comprehensive datasets. Additionally, we explore the complexities of MLMs in virtual and real embodied agents, highlighting their significance in facilitating interactions in dynamic digital and physical environments. Finally, we summarize the challenges and limitations of embodied AI and discuss their potential future directions. We hope this survey will serve as a foundational reference for the research community and inspire continued innovation. The associated project can be found at https://github.com/HCPLab-SYSU/Embodied_AI_Paper_List.
△ Less
Submitted 11 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
ChatGPT Doesn't Trust Chargers Fans: Guardrail Sensitivity in Context
Authors:
Victoria R. Li,
Yida Chen,
Naomi Saphra
Abstract:
While the biases of language models in production are extensively documented, the biases of their guardrails have been neglected. This paper studies how contextual information about the user influences the likelihood of an LLM to refuse to execute a request. By generating user biographies that offer ideological and demographic information, we find a number of biases in guardrail sensitivity on GPT…
▽ More
While the biases of language models in production are extensively documented, the biases of their guardrails have been neglected. This paper studies how contextual information about the user influences the likelihood of an LLM to refuse to execute a request. By generating user biographies that offer ideological and demographic information, we find a number of biases in guardrail sensitivity on GPT-3.5. Younger, female, and Asian-American personas are more likely to trigger a refusal guardrail when requesting censored or illegal information. Guardrails are also sycophantic, refusing to comply with requests for a political position the user is likely to disagree with. We find that certain identity groups and seemingly innocuous information, e.g., sports fandom, can elicit changes in guardrail sensitivity similar to direct statements of political ideology. For each demographic category and even for American football team fandom, we find that ChatGPT appears to infer a likely political ideology and modify guardrail behavior accordingly.
△ Less
Submitted 10 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
SilverCycling: Exploring the Impact of Bike-Based Locomotion on Spatial Orientation for Older Adults in VR
Authors:
Qiongyan Chen,
Zhiqing Wu,
Yucheng Liu,
Lei Han,
Zisu Li,
Ge Lin Kan,
Mingming Fan
Abstract:
Spatial orientation is essential for people to effectively navigate and interact with the environment in everyday life. With age-related cognitive decline, providing VR locomotion techniques with better spatial orientation performance for older adults becomes important. Such advancements not only make VR more accessible to older adults but also enable them to reap the potential health benefits of…
▽ More
Spatial orientation is essential for people to effectively navigate and interact with the environment in everyday life. With age-related cognitive decline, providing VR locomotion techniques with better spatial orientation performance for older adults becomes important. Such advancements not only make VR more accessible to older adults but also enable them to reap the potential health benefits of VR technology. Natural motion-based locomotion has been shown to be effective in enhancing younger users' performance in VR navigation tasks that require spatial orientation. However, there is a lack of understanding regarding the impact of natural motion-based locomotion on spatial orientation for older adults in VR. To address this gap, we selected the SilverCycling system, a VR bike-based locomotion technique that we developed, as a representative of natural motion-based locomotion, guided by findings from our pilot study. We conducted a user study with 16 older adults to compare SilverCycling with the joystick-based controller. The findings suggest SilverCycling's potential to significantly enhance spatial orientation in the open-road urban environment for older adults, offering a better user experience. Based on our findings, we identify key factors influencing spatial orientation and propose design recommendations to make VR locomotion more accessible and user-friendly for older adults.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Digging into the Interior of Hot Cores with ALMA (DIHCA). IV. Fragmentation in High-mass Star-Forming Clumps
Authors:
Kosuke Ishihara,
Patricio Sanhueza,
Fumitaka Nakamura,
Masao Saito,
Huei-Ru V. Chen,
Shanghuo Li,
Fernando Olguin,
Kotomi Taniguchi,
Kaho Morii,
Xing Lu,
Qiuyi Luo,
Takeshi Sakai,
Qizhou Zhang
Abstract:
Fragmentation contributes to the formation and evolution of stars. Observationally, high-mass stars are known to form multiple-star systems, preferentially in cluster environments. Theoretically, Jeans instability has been suggested to determine characteristic fragmentation scales, and thermal or turbulent motion in the parental gas clump mainly contributes to the instability. To search for such a…
▽ More
Fragmentation contributes to the formation and evolution of stars. Observationally, high-mass stars are known to form multiple-star systems, preferentially in cluster environments. Theoretically, Jeans instability has been suggested to determine characteristic fragmentation scales, and thermal or turbulent motion in the parental gas clump mainly contributes to the instability. To search for such a characteristic fragmentation scale, we have analyzed ALMA 1.33 mm continuum observations toward 30 high-mass star-forming clumps taken by the Digging into the Interior of Hot Cores with ALMA (DIHCA) survey. We have identified 573 cores using the dendrogram algorithm and measured the separation of cores by using the Minimum Spanning Tree (MST) technique. The core separation corrected by projection effects has a distribution peaked around 5800 au. In order to remove biases produced by different distances and sensitivities, we further smooth the images to a common physical scale and perform completeness tests. Our careful analysis finds a characteristic fragmentation scale of $\sim$7000 au, comparable to the thermal Jeans length of the clumps. We conclude that thermal Jeans fragmentation plays a dominant role in determining the clump fragmentation in high-mass star-forming regions, without the need of invoking turbulent Jeans fragmentation.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Dynamic Correlation Learning and Regularization for Multi-Label Confidence Calibration
Authors:
Tianshui Chen,
Weihang Wang,
Tao Pu,
**ghui Qin,
Zhi**g Yang,
Jie Liu,
Liang Lin
Abstract:
Modern visual recognition models often display overconfidence due to their reliance on complex deep neural networks and one-hot target supervision, resulting in unreliable confidence scores that necessitate calibration. While current confidence calibration techniques primarily address single-label scenarios, there is a lack of focus on more practical and generalizable multi-label contexts. This pa…
▽ More
Modern visual recognition models often display overconfidence due to their reliance on complex deep neural networks and one-hot target supervision, resulting in unreliable confidence scores that necessitate calibration. While current confidence calibration techniques primarily address single-label scenarios, there is a lack of focus on more practical and generalizable multi-label contexts. This paper introduces the Multi-Label Confidence Calibration (MLCC) task, aiming to provide well-calibrated confidence scores in multi-label scenarios. Unlike single-label images, multi-label images contain multiple objects, leading to semantic confusion and further unreliability in confidence scores. Existing single-label calibration methods, based on label smoothing, fail to account for category correlations, which are crucial for addressing semantic confusion, thereby yielding sub-optimal performance. To overcome these limitations, we propose the Dynamic Correlation Learning and Regularization (DCLR) algorithm, which leverages multi-grained semantic correlations to better model semantic confusion for adaptive regularization. DCLR learns dynamic instance-level and prototype-level similarities specific to each category, using these to measure semantic correlations across different categories. With this understanding, we construct adaptive label vectors that assign higher values to categories with strong correlations, thereby facilitating more effective regularization. We establish an evaluation benchmark, re-implementing several advanced confidence calibration algorithms and applying them to leading multi-label recognition (MLR) models for fair comparison. Through extensive experiments, we demonstrate the superior performance of DCLR over existing methods in providing reliable confidence scores in multi-label scenarios.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Perturbative approach to time-dependent quantum systems and applications to one-crossing multistate Landau-Zener models
Authors:
Rongyu Hu,
Chen Sun
Abstract:
We formulate a perturbative approach for studying a class of multi-level time-dependent quantum systems with constant off-diagonal couplings and diabatic energies being odd functions of time. Applying this approach to a general multistate Landau-Zener (MLZ) model with all diabatic levels crossing at one point (named the one-crossing MLZ model), we derive analytical formulas of all its transition p…
▽ More
We formulate a perturbative approach for studying a class of multi-level time-dependent quantum systems with constant off-diagonal couplings and diabatic energies being odd functions of time. Applying this approach to a general multistate Landau-Zener (MLZ) model with all diabatic levels crossing at one point (named the one-crossing MLZ model), we derive analytical formulas of all its transition probabilities up to $4$th order in the couplings. These analytical asymptotic solutions at the diabatic limit can serve as reliable benchmarks for future studies of any unsolved one-crossing MLZ models.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
A Back-End Electronics Based on Fiber Communication for Small to Medium-Scale Physics Experiments
Authors:
Jianguo Liu,
Yu Wang,
Changqing Feng,
Shubin Liu,
Qian Chen
Abstract:
Many small and medium-sized physics experiments are being conducted worldwide. These experiments have similar requirements for readout electronics, especially the back-end electronics. Some experiments need a trigger logic unit(TLU) to provide timing and synchronous control signals. This paper introduces a back-end electronics design for small and medium-sized physics experiments; it adopts a daug…
▽ More
Many small and medium-sized physics experiments are being conducted worldwide. These experiments have similar requirements for readout electronics, especially the back-end electronics. Some experiments need a trigger logic unit(TLU) to provide timing and synchronous control signals. This paper introduces a back-end electronics design for small and medium-sized physics experiments; it adopts a daughter-motherboard structure integrated TLU function to provide greater flexibility. Different interfaces and protocols can be flexibly selected according to data bandwidth requirements. It supports 32 optical fiber interfaces based on a field-programmable gate array (FPGA) of normal IOs with 400Mbps of data bandwidth for each channel. At the same time, it supports 16 high-speed communication interfaces based on GTX port with several Gbps data bandwidth of each channel. For the TLU function, this design has 8 HDMI interfaces and one RJ45 interface to provide synchronous triggers and other control signals, and it has six analog LEMOs and four digital LEMOs to accept asynchronous signals from an external source. These design specifications can meet the needs of most small and medium-sized experiments. This set of back-end electronics has been successfully used in experiments such as PandaX-III, VLAST, and moungraphy. Moreover, it has successfully conducted beam tests with a readout of the data of VLAST detectors at CERN.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Revealing the evanescent components in Kronecker-product based codebooks: insights and implications
Authors:
Jun Yang,
Yijian Chen,
Yunqi Sun,
Yuan Si,
Hongkang Yu,
Shujuan Zhang,
Zhaohua Lu
Abstract:
The orthogonal bases of discrete Fourier transform (DFT) has been recognized as the standard spatial-domain bases for Type I, Type II and enhanced Type II codewords by the 3rd Generation Partnership Project (3GPP). For uniform planar arrays, these spatial-domain bases are derived as the Kronecker product of one-dimensional DFT bases. Theoretically, each spatial basis corresponds to a beam directed…
▽ More
The orthogonal bases of discrete Fourier transform (DFT) has been recognized as the standard spatial-domain bases for Type I, Type II and enhanced Type II codewords by the 3rd Generation Partnership Project (3GPP). For uniform planar arrays, these spatial-domain bases are derived as the Kronecker product of one-dimensional DFT bases. Theoretically, each spatial basis corresponds to a beam directed towards a specific angle of departure and the set of bases represent the orthogonal beams that cover the front hemisphere of an array. While the Kronecker-product based precoding scheme facilitates the concise indexing of a codeword in the codebooks through precoding matrix indicators (PMIs) in channel state information feedback, it introduces redundant spatial beams characterized by high spatial-frequency components. This paper investigates the presence of codewords representing high spatial-frequency components within the Kronecker-product based codebooks. Through theoretical analysis and simulations, we confirm the redundancy of these codewords in MIMO communications, advocating for their removal from the codebooks to enhance system performance. Several topics relevant to the high spatial components are also involved in the discussion. Practical suggestions regarding future standard design are provided based on our theoretical analysis and simulation results.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Pretraining-finetuning Framework for Efficient Co-design: A Case Study on Quadruped Robot Parkour
Authors:
Ci Chen,
Jiyu Yu,
Haojian Lu,
Hongbo Gao,
Rong Xiong,
Yue Wang
Abstract:
In nature, animals with exceptional locomotion abilities, such as cougars, often possess asymmetric fore and hind legs, with their powerful hind legs acting as reservoirs of energy for leaps. This observation inspired us: could optimize the leg length of quadruped robots endow them with similar locomotive capabilities? In this paper, we propose an approach that co-optimizes the mechanical structur…
▽ More
In nature, animals with exceptional locomotion abilities, such as cougars, often possess asymmetric fore and hind legs, with their powerful hind legs acting as reservoirs of energy for leaps. This observation inspired us: could optimize the leg length of quadruped robots endow them with similar locomotive capabilities? In this paper, we propose an approach that co-optimizes the mechanical structure and control policy to boost the locomotive prowess of quadruped robots. Specifically, we introduce a novel pretraining-finetuning framework, which not only guarantees optimal control strategies for each mechanical candidate but also ensures time efficiency. Additionally, we have devised an innovative training method for our pretraining network, integrating spatial domain randomization with regularization methods, markedly improving the network's generalizability. Our experimental results indicate that the proposed pretraining-finetuning framework significantly enhances the overall co-design performance with less time consumption. Moreover, the co-design strategy substantially exceeds the conventional method of independently optimizing control strategies, further improving the robot's locomotive performance and providing an innovative approach to enhancing the extreme parkour capabilities of quadruped robots.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Enhancing Robustness and Security in ISAC Network Design: Leveraging Transmissive Reconfigurable Intelligent Surface with RSMA
Authors:
Ziwei Liu,
Wen Chen,
Qingqing Wu,
Zhendong Li,
Xusheng Zhu,
Qiong Wu,
Nan Cheng
Abstract:
In this paper, we propose a novel transmissive reconfigurable intelligent surface transceiver-enhanced robust and secure integrated sensing and communication network. A time-division sensing communication mechanism is designed for the scenario, which enables communication and sensing to share wireless resources. To address the interference management problem and hinder eavesdrop**, we implement…
▽ More
In this paper, we propose a novel transmissive reconfigurable intelligent surface transceiver-enhanced robust and secure integrated sensing and communication network. A time-division sensing communication mechanism is designed for the scenario, which enables communication and sensing to share wireless resources. To address the interference management problem and hinder eavesdrop**, we implement rate-splitting multiple access (RSMA), where the common stream is designed as a useful signal and an artificial noise, while taking into account the imperfect channel state information and modeling the channel for the illegal users in a fine-grained manner as well as giving an upper bound on the error. We introduce the secrecy outage probability and construct an optimization problem with secrecy sum-rate as the objective functions to optimize the common stream beamforming matrix, the private stream beamforming matrix and the timeslot duration variable. Due to the coupling of the optimization variables and the infinity of the error set, the proposed problem is a nonconvex optimization problem that cannot be solved directly. In order to address the above challenges, the block coordinate descent-based second-order cone programming algorithm is used to decouple the optimization variables and solving the problem. Specifically, the problem is decoupled into two subproblems concerning the common stream beamforming matrix, the private stream beamforming matrix, and the timeslot duration variable, which are solved by alternating optimization until convergence is reached. To solve the problem, S-procedure, Bernstein's inequality and successive convex approximation are employed to deal with the objective function and non-convex constraints. Numerical simulation results verify the superiority of the proposed scheme in improving the secrecy energy efficiency and the Cramér-Rao boundary.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Threats and Defenses in Federated Learning Life Cycle: A Comprehensive Survey and Challenges
Authors:
Yanli Li,
Zhongliang Guo,
Nan Yang,
Huaming Chen,
Dong Yuan,
Wei** Ding
Abstract:
Federated Learning (FL) offers innovative solutions for privacy-preserving collaborative machine learning (ML). Despite its promising potential, FL is vulnerable to various attacks due to its distributed nature, affecting the entire life cycle of FL services. These threats can harm the model's utility or compromise participants' privacy, either directly or indirectly. In response, numerous defense…
▽ More
Federated Learning (FL) offers innovative solutions for privacy-preserving collaborative machine learning (ML). Despite its promising potential, FL is vulnerable to various attacks due to its distributed nature, affecting the entire life cycle of FL services. These threats can harm the model's utility or compromise participants' privacy, either directly or indirectly. In response, numerous defense frameworks have been proposed, demonstrating effectiveness in specific settings and scenarios. To provide a clear understanding of the current research landscape, this paper reviews the most representative and state-of-the-art threats and defense frameworks throughout the FL service life cycle. We start by identifying FL threats that harm utility and privacy, including those with potential or direct impacts. Then, we dive into the defense frameworks, analyze the relationship between threats and defenses, and compare the trade-offs among different defense strategies. Finally, we summarize current research bottlenecks and offer insights into future research directions to conclude this survey. We hope this survey sheds light on trustworthy FL research and contributes to the FL community.
△ Less
Submitted 11 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
Clones of Borel Boolean Functions
Authors:
Ruiyuan Chen,
Ilir Ziba
Abstract:
We study the lattice of all Borel clones on $2 = \{0,1\}$: classes of Borel functions $f : 2^n \to 2$, $n \le ω$, which are closed under composition and include all projections. This is a natural extension to countable arities of Post's 1941 classification of all clones of finitary Boolean functions. Every Borel clone restricts to a finitary clone, yielding a "projection" from the lattice of all B…
▽ More
We study the lattice of all Borel clones on $2 = \{0,1\}$: classes of Borel functions $f : 2^n \to 2$, $n \le ω$, which are closed under composition and include all projections. This is a natural extension to countable arities of Post's 1941 classification of all clones of finitary Boolean functions. Every Borel clone restricts to a finitary clone, yielding a "projection" from the lattice of all Borel clones to Post's lattice. It is well-known that each finitary clone of affine mod 2 functions admits a unique extension to a Borel clone. We show that over each finitary clone containing either both $\wedge, \vee$, or the 2-out-of-3 median operation, there lie at least 2 but only finitely many Borel clones. Over the remaining clones in Post's lattice, we give only a partial classification of the Borel extensions, and present some evidence that the full structure may be quite complicated.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Improving the Transferability of Adversarial Examples by Feature Augmentation
Authors:
Donghua Wang,
Wen Yao,
Tingsong Jiang,
Xiaohu Zheng,
Junqi Wu,
Xiaoqian Chen
Abstract:
Despite the success of input transformation-based attacks on boosting adversarial transferability, the performance is unsatisfying due to the ignorance of the discrepancy across models. In this paper, we propose a simple but effective feature augmentation attack (FAUG) method, which improves adversarial transferability without introducing extra computation costs. Specifically, we inject the random…
▽ More
Despite the success of input transformation-based attacks on boosting adversarial transferability, the performance is unsatisfying due to the ignorance of the discrepancy across models. In this paper, we propose a simple but effective feature augmentation attack (FAUG) method, which improves adversarial transferability without introducing extra computation costs. Specifically, we inject the random noise into the intermediate features of the model to enlarge the diversity of the attack gradient, thereby mitigating the risk of overfitting to the specific model and notably amplifying adversarial transferability. Moreover, our method can be combined with existing gradient attacks to augment their performance further. Extensive experiments conducted on the ImageNet dataset across CNN and transformer models corroborate the efficacy of our method, e.g., we achieve improvement of +26.22% and +5.57% on input transformation-based attacks and combination methods, respectively.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Universal Multi-view Black-box Attack against Object Detectors via Layout Optimization
Authors:
Donghua Wang,
Wen Yao,
Tingsong Jiang,
Chao Li,
Xiaoqian Chen
Abstract:
Object detectors have demonstrated vulnerability to adversarial examples crafted by small perturbations that can deceive the object detector. Existing adversarial attacks mainly focus on white-box attacks and are merely valid at a specific viewpoint, while the universal multi-view black-box attack is less explored, limiting their generalization in practice. In this paper, we propose a novel univer…
▽ More
Object detectors have demonstrated vulnerability to adversarial examples crafted by small perturbations that can deceive the object detector. Existing adversarial attacks mainly focus on white-box attacks and are merely valid at a specific viewpoint, while the universal multi-view black-box attack is less explored, limiting their generalization in practice. In this paper, we propose a novel universal multi-view black-box attack against object detectors, which optimizes a universal adversarial UV texture constructed by multiple image stickers for a 3D object via the designed layout optimization algorithm. Specifically, we treat the placement of image stickers on the UV texture as a circle-based layout optimization problem, whose objective is to find the optimal circle layout filled with image stickers so that it can deceive the object detector under the multi-view scenario. To ensure reasonable placement of image stickers, two constraints are elaborately devised. To optimize the layout, we adopt the random search algorithm enhanced by the devised important-aware selection strategy to find the most appropriate image sticker for each circle from the image sticker pools. Extensive experiments conducted on four common object detectors suggested that the detection performance decreases by a large magnitude of 74.29% on average in multi-view scenarios. Additionally, a novel evaluation tool based on the photo-realistic simulator is designed to assess the texture-based attack fairly.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Realization of Conditional Operations through Transition Pathway Engineering
Authors:
Sheng Zhang,
Peng Duan,
Yun-Jie Wang,
Tian-Le Wang,
Peng Wang,
Ren-Ze Zhao,
Xiao-Yan Yang,
Ze-An Zhao,
Liang-Liang Guo,
Yong Chen,
Hai-Feng Zhang,
Lei Du,
Hao-Ran Tao,
Zhi-Fei Li,
Yuan Wu,
Zhi-Long Jia,
Wei-Cheng Kong,
Zhao-Yun Chen,
Yu-Chun Wu,
Guo-** Guo
Abstract:
In the NISQ era, achieving large-scale quantum computing demands compact circuits to mitigate decoherence and gate error accumulation. Quantum operations with diverse degrees of freedom hold promise for circuit compression, but conventional approaches encounter challenges in simultaneously adjusting multiple parameters. Here, we propose a transition composite gate (TCG) scheme grounded on state-se…
▽ More
In the NISQ era, achieving large-scale quantum computing demands compact circuits to mitigate decoherence and gate error accumulation. Quantum operations with diverse degrees of freedom hold promise for circuit compression, but conventional approaches encounter challenges in simultaneously adjusting multiple parameters. Here, we propose a transition composite gate (TCG) scheme grounded on state-selective transition path engineering, enabling more expressive conditional operations. We experimentally validate a controlled unitary (CU) gate as an example, with independent and continuous parameters. By adjusting the parameters of $\rm X^{12}$ gate, we obtain the CU family with a fidelity range of 95.2% to 99.0% leveraging quantum process tomography (QPT). To demonstrate the capability of circuit compression, we use TCG scheme to prepare 3-qubit Greenberger-Horne-Zeilinger (GHZ) and W states, with the fidelity of 96.77% and 95.72%. TCG can achieve the reduction in circuit depth of about 40% and 44% compared with the use of CZ gates only. Moreover, we show that short-path TCG (SPTCG) can further reduce the state-preparation circuit time cost. The TCG scheme exhibits advantages in certain quantum circuits and shows significant potential for large-scale quantum algorithms.
△ Less
Submitted 10 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
PDEformer-1: A Foundation Model for One-Dimensional Partial Differential Equations
Authors:
Zhanhong Ye,
Xiang Huang,
Leheng Chen,
Zining Liu,
Bingyang Wu,
Hongsheng Liu,
Zidong Wang,
Bin Dong
Abstract:
This paper introduces PDEformer-1, a versatile neural solver capable of simultaneously addressing various partial differential equations (PDEs). With the PDE represented as a computational graph, we facilitate the seamless integration of symbolic and numeric information inherent in a PDE. A graph Transformer and an implicit neural representation (INR) are employed subsequently to generate mesh-fre…
▽ More
This paper introduces PDEformer-1, a versatile neural solver capable of simultaneously addressing various partial differential equations (PDEs). With the PDE represented as a computational graph, we facilitate the seamless integration of symbolic and numeric information inherent in a PDE. A graph Transformer and an implicit neural representation (INR) are employed subsequently to generate mesh-free predicted solutions. We generated a dataset with up to three million samples involving diverse one-dimensional PDEs to pretrain our model. Compared with baseline models trained specifically on benchmark datasets, our pretrained model achieves comparable accuracy via zero-shot inference, and the advantage expands after finetuning. For PDEs new or unseen in the pretraining stage, our model can adapt quickly by finetuning on a relatively small set of examples from the target equation. Additionally, PDEformer-1 demonstrates promising results in the inverse problem of PDE scalar coefficient recovery and coefficient field recovery.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Experimental Demonstration of 16D Voronoi Constellation with Two-Level Coding over 50km Four-Core Fiber
Authors:
Can Zhao,
Bin Chen,
Jiaqi Cai,
Zhiwei Liang,
Yi Lei,
Junjie Xiong,
Lin Ma,
Daohui Hu,
Lin Sun,
Gangxiang Shen
Abstract:
A 16-dimensional Voronoi constellation concatenated with multilevel coding is experimentally demonstrated over a 50km four-core fiber transmission system. The proposed scheme reduces the required launch power by 6dB and provides a 17dB larger operating range than 16QAM with BICM at the outer HD-FEC BER threshold.
A 16-dimensional Voronoi constellation concatenated with multilevel coding is experimentally demonstrated over a 50km four-core fiber transmission system. The proposed scheme reduces the required launch power by 6dB and provides a 17dB larger operating range than 16QAM with BICM at the outer HD-FEC BER threshold.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Toward Motion Robustness: A masked attention regularization framework in remote photoplethysmography
Authors:
Pengfei Zhao,
Qigong Sun,
Xiaolin Tian,
Yige Yang,
Shuo Tao,
Jie Cheng,
Jiantong Chen
Abstract:
There has been growing interest in facial video-based remote photoplethysmography (rPPG) measurement recently, with a focus on assessing various vital signs such as heart rate and heart rate variability. Despite previous efforts on static datasets, their approaches have been hindered by inaccurate region of interest (ROI) localization and motion issues, and have shown limited generalization in rea…
▽ More
There has been growing interest in facial video-based remote photoplethysmography (rPPG) measurement recently, with a focus on assessing various vital signs such as heart rate and heart rate variability. Despite previous efforts on static datasets, their approaches have been hindered by inaccurate region of interest (ROI) localization and motion issues, and have shown limited generalization in real-world scenarios. To address these challenges, we propose a novel masked attention regularization (MAR-rPPG) framework that mitigates the impact of ROI localization and complex motion artifacts. Specifically, our approach first integrates a masked attention regularization mechanism into the rPPG field to capture the visual semantic consistency of facial clips, while it also employs a masking technique to prevent the model from overfitting on inaccurate ROIs and subsequently degrading its performance. Furthermore, we propose an enhanced rPPG expert aggregation (EREA) network as the backbone to obtain rPPG signals and attention maps simultaneously. Our EREA network is capable of discriminating divergent attentions from different facial areas and retaining the consistency of spatiotemporal attention maps. For motion robustness, a simple open source detector MediaPipe for data preprocessing is sufficient for our framework due to its superior capability of rPPG signal extraction and attention regularization. Exhaustive experiments on three benchmark datasets (UBFC-rPPG, PURE, and MMPD) substantiate the superiority of our proposed method, outperforming recent state-of-the-art works by a considerable margin.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Entropy Law: The Story Behind Data Compression and LLM Performance
Authors:
Mingjia Yin,
Chuhan Wu,
Yufei Wang,
Hao Wang,
Wei Guo,
Yasheng Wang,
Yong Liu,
Ruiming Tang,
Defu Lian,
Enhong Chen
Abstract:
Data is the cornerstone of large language models (LLMs), but not all data is useful for model learning. Carefully selected data can better elicit the capabilities of LLMs with much less computational overhead. Most methods concentrate on evaluating the quality of individual samples in data selection, while the combinatorial effects among samples are neglected. Even if each sample is of perfect qua…
▽ More
Data is the cornerstone of large language models (LLMs), but not all data is useful for model learning. Carefully selected data can better elicit the capabilities of LLMs with much less computational overhead. Most methods concentrate on evaluating the quality of individual samples in data selection, while the combinatorial effects among samples are neglected. Even if each sample is of perfect quality, their combinations may be suboptimal in teaching LLMs due to their intrinsic homogeneity or contradiction. In this paper, we aim to uncover the underlying relationships between LLM performance and data selection. Inspired by the information compression nature of LLMs, we uncover an ``entropy law'' that connects LLM performance with data compression ratio and first-epoch training loss, which reflect the information redundancy of a dataset and the mastery of inherent knowledge encoded in this dataset, respectively. Through both theoretical deduction and empirical evaluation, we find that model performance is negatively correlated to the compression ratio of training data, which usually yields a lower training loss. Based on the findings of the entropy law, we propose a quite efficient and universal data selection method named \textbf{ZIP} for training LLMs, which aim to prioritize data subsets exhibiting a low compression ratio. Based on a multi-stage algorithm that selects diverse data in a greedy manner, we can obtain a good data subset with satisfactory diversity. Extensive experiments have been conducted to validate the entropy law and the superiority of ZIP across different LLM backbones and alignment stages. We also present an interesting application of entropy law that can detect potential performance risks at the beginning of model training.
△ Less
Submitted 10 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
Implicit Regression in Subspace for High-Sensitivity CEST Imaging
Authors:
Chu Chen,
Yang Liu,
Se Weon Park,
Jizhou Li,
Kannie W. Y. Chan,
Raymond H. F. Chan
Abstract:
Chemical Exchange Saturation Transfer (CEST) MRI demonstrates its capability in significantly enhancing the detection of proteins and metabolites with low concentrations through exchangeable protons. The clinical application of CEST, however, is constrained by its low contrast and low signal-to-noise ratio (SNR) in the acquired data. Denoising, as one of the post-processing stages for CEST data, c…
▽ More
Chemical Exchange Saturation Transfer (CEST) MRI demonstrates its capability in significantly enhancing the detection of proteins and metabolites with low concentrations through exchangeable protons. The clinical application of CEST, however, is constrained by its low contrast and low signal-to-noise ratio (SNR) in the acquired data. Denoising, as one of the post-processing stages for CEST data, can effectively improve the accuracy of CEST quantification. In this work, by modeling spatial variant z-spectrums into low-dimensional subspace, we introduce Implicit Regression in Subspace (IRIS), which is an unsupervised denoising algorithm utilizing the excellent property of implicit neural representation for continuous map**. Experiments conducted on both synthetic and in-vivo data demonstrate that our proposed method surpasses other CEST denoising methods regarding both qualitative and quantitative performance.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
AI-based Automatic Segmentation of Prostate on Multi-modality Images: A Review
Authors:
Rui **,
Derun Li,
Dehui Xiang,
Lei Zhang,
Hailing Zhou,
Fei Shi,
Weifang Zhu,
**g Cai,
Tao Peng,
Xinjian Chen
Abstract:
Prostate cancer represents a major threat to health. Early detection is vital in reducing the mortality rate among prostate cancer patients. One approach involves using multi-modality (CT, MRI, US, etc.) computer-aided diagnosis (CAD) systems for the prostate region. However, prostate segmentation is challenging due to imperfections in the images and the prostate's complex tissue structure. The ad…
▽ More
Prostate cancer represents a major threat to health. Early detection is vital in reducing the mortality rate among prostate cancer patients. One approach involves using multi-modality (CT, MRI, US, etc.) computer-aided diagnosis (CAD) systems for the prostate region. However, prostate segmentation is challenging due to imperfections in the images and the prostate's complex tissue structure. The advent of precision medicine and a significant increase in clinical capacity have spurred the need for various data-driven tasks in the field of medical imaging. Recently, numerous machine learning and data mining tools have been integrated into various medical areas, including image segmentation. This article proposes a new classification method that differentiates supervision types, either in number or kind, during the training phase. Subsequently, we conducted a survey on artificial intelligence (AI)-based automatic prostate segmentation methods, examining the advantages and limitations of each. Additionally, we introduce variants of evaluation metrics for the verification and performance assessment of the segmentation method and summarize the current challenges. Finally, future research directions and development trends are discussed, reflecting the outcomes of our literature survey, suggesting high-precision detection and treatment of prostate cancer as a promising avenue.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
A Randomized Method for Simulating Lindblad Equations and Thermal State Preparation
Authors:
Hongrui Chen,
Bowen Li,
Jianfeng Lu,
Lexing Ying
Abstract:
We study a qDRIFT-type randomized method to simulate the Lindblad equations. For Lindblad dynamics generated by an ensemble of Lindbladians $\{\mathcal{L}_a\}_{a \in \mathcal{A}}$, our approach implements a single randomly sampled Lindbladian $\mathcal{L}_a$ at each time step. The only assumption is that each $\mathcal{L}_a$ involves only a single jump operator with an efficient implementation ava…
▽ More
We study a qDRIFT-type randomized method to simulate the Lindblad equations. For Lindblad dynamics generated by an ensemble of Lindbladians $\{\mathcal{L}_a\}_{a \in \mathcal{A}}$, our approach implements a single randomly sampled Lindbladian $\mathcal{L}_a$ at each time step. The only assumption is that each $\mathcal{L}_a$ involves only a single jump operator with an efficient implementation available for the evolution $e^{t \mathcal{L}_a}$.
A notable application of the randomized method is for quantum Gibbs sampling, where the Lindblad dynamics is utilized to prepare a specific Gibbs state. Unlike existing deterministic methods that require numerous jump operators to ensure ergodicity, our approach simplifies the implementation by using a single randomly sampled jump operator. As an example, we demonstrate that our method ensures fast thermalization of Hamiltonian systems characterized by random Pauli strings, where the spectral density closely adheres to the semi-circle law.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Revolutionizing Battery Disassembly: The Design and Implementation of a Battery Disassembly Autonomous Mobile Manipulator Robot(BEAM-1)
Authors:
Yanlong Peng,
Zhigang Wang,
Yisheng Zhang,
Shengmin Zhang,
Nan Cai,
Fan Wu,
Ming Chen
Abstract:
The efficient disassembly of end-of-life electric vehicle batteries(EOL-EVBs) is crucial for green manufacturing and sustainable development. The current pre-programmed disassembly conducted by the Autonomous Mobile Manipulator Robot(AMMR) struggles to meet the disassembly requirements in dynamic environments, complex scenarios, and unstructured processes. In this paper, we propose a Battery Disas…
▽ More
The efficient disassembly of end-of-life electric vehicle batteries(EOL-EVBs) is crucial for green manufacturing and sustainable development. The current pre-programmed disassembly conducted by the Autonomous Mobile Manipulator Robot(AMMR) struggles to meet the disassembly requirements in dynamic environments, complex scenarios, and unstructured processes. In this paper, we propose a Battery Disassembly AMMR(BEAM-1) system based on NeuralSymbolic AI. It detects the environmental state by leveraging a combination of multi-sensors and neural predicates and then translates this information into a quasi-symbolic space. In real-time, it identifies the optimal sequence of action primitives through LLM-heuristic tree search, ensuring high-precision execution of these primitives. Additionally, it employs positional speculative sampling using intuitive networks and achieves the disassembly of various bolt types with a meticulously designed end-effector. Importantly, BEAM-1 is a continuously learning embodied intelligence system capable of subjective reasoning like a human, and possessing intuition. A large number of real scene experiments have proved that it can autonomously perceive, decide, and execute to complete the continuous disassembly of bolts in multiple, multi-category, and complex situations, with a success rate of 98.78%. This research attempts to use NeuroSymbolic AI to give robots real autonomous reasoning, planning, and learning capabilities. BEAM-1 realizes the revolution of battery disassembly. Its framework can be easily ported to any robotic system to realize different application scenarios, which provides a ground-breaking idea for the design and implementation of future embodied intelligent robotic systems.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
LLM for Mobile: An Initial Roadmap
Authors:
Daihang Chen,
Yonghui Liu,
Mingyi Zhou,
Yanjie Zhao,
Haoyu Wang,
Shuai Wang,
Xiao Chen,
Tegawendé F. Bissyandé,
Jacques Klein,
Li Li
Abstract:
When mobile meets LLMs, mobile app users deserve to have more intelligent usage experiences. For this to happen, we argue that there is a strong need to appl LLMs for the mobile ecosystem. We therefore provide a research roadmap for guiding our fellow researchers to achieve that as a whole. In this roadmap, we sum up six directions that we believe are urgently required for research to enable nativ…
▽ More
When mobile meets LLMs, mobile app users deserve to have more intelligent usage experiences. For this to happen, we argue that there is a strong need to appl LLMs for the mobile ecosystem. We therefore provide a research roadmap for guiding our fellow researchers to achieve that as a whole. In this roadmap, we sum up six directions that we believe are urgently required for research to enable native intelligence in mobile devices. In each direction, we further summarize the current research progress and the gaps that still need to be filled by our fellow researchers.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
FinCon: A Synthesized LLM Multi-Agent System with Conceptual Verbal Reinforcement for Enhanced Financial Decision Making
Authors:
Yangyang Yu,
Zhiyuan Yao,
Haohang Li,
Zhiyang Deng,
Yupeng Cao,
Zhi Chen,
Jordan W. Suchow,
Rong Liu,
Zhenyu Cui,
Denghui Zhang,
Koduvayur Subbalakshmi,
Guojun Xiong,
Yueru He,
Jimin Huang,
Dong Li,
Qianqian Xie
Abstract:
Large language models (LLMs) have demonstrated notable potential in conducting complex tasks and are increasingly utilized in various financial applications. However, high-quality sequential financial investment decision-making remains challenging. These tasks require multiple interactions with a volatile environment for every decision, demanding sufficient intelligence to maximize returns and man…
▽ More
Large language models (LLMs) have demonstrated notable potential in conducting complex tasks and are increasingly utilized in various financial applications. However, high-quality sequential financial investment decision-making remains challenging. These tasks require multiple interactions with a volatile environment for every decision, demanding sufficient intelligence to maximize returns and manage risks. Although LLMs have been used to develop agent systems that surpass human teams and yield impressive investment returns, opportunities to enhance multi-sourced information synthesis and optimize decision-making outcomes through timely experience refinement remain unexplored. Here, we introduce the FinCon, an LLM-based multi-agent framework with CONceptual verbal reinforcement tailored for diverse FINancial tasks. Inspired by effective real-world investment firm organizational structures, FinCon utilizes a manager-analyst communication hierarchy. This structure allows for synchronized cross-functional agent collaboration towards unified goals through natural language interactions and equips each agent with greater memory capacity than humans. Additionally, a risk-control component in FinCon enhances decision quality by episodically initiating a self-critiquing mechanism to update systematic investment beliefs. The conceptualized beliefs serve as verbal reinforcement for the future agent's behavior and can be selectively propagated to the appropriate node that requires knowledge updates. This feature significantly improves performance while reducing unnecessary peer-to-peer communication costs. Moreover, FinCon demonstrates strong generalization capabilities in various financial tasks, including single stock trading and portfolio management.
△ Less
Submitted 10 July, 2024; v1 submitted 9 July, 2024;
originally announced July 2024.
-
Visual-Geometry GP-based Navigable Space for Autonomous Navigation
Authors:
Mahmoud Ali,
Durgkant Pushp,
Zheng Chen,
Lantao Liu
Abstract:
Autonomous navigation in unknown environments is challenging and demands the consideration of both geometric and semantic information in order to parse the navigability of the environment. In this work, we propose a novel space modeling framework, Visual-Geometry Sparse Gaussian Process (VG-SGP), that simultaneously considers semantics and geometry of the scene. Our proposed approach can overcome…
▽ More
Autonomous navigation in unknown environments is challenging and demands the consideration of both geometric and semantic information in order to parse the navigability of the environment. In this work, we propose a novel space modeling framework, Visual-Geometry Sparse Gaussian Process (VG-SGP), that simultaneously considers semantics and geometry of the scene. Our proposed approach can overcome the limitation of visual planners that fail to recognize geometry associated with the semantic and the geometric planners that completely overlook the semantic information which is very critical in real-world navigation. The proposed method leverages dual Sparse Gaussian Processes in an integrated manner; the first is trained to forecast geometrically navigable spaces while the second predicts the semantically navigable areas. This integrated model is able to pinpoint the overlap** (geometric and semantic) navigable space. The simulation and real-world experiments demonstrate that the ability of the proposed VG-SGP model, coupled with our innovative navigation strategy, outperforms models solely reliant on visual or geometric navigation algorithms, highlighting a superior adaptive behavior.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
General and Task-Oriented Video Segmentation
Authors:
Mu Chen,
Liulei Li,
Wenguan Wang,
Ruijie Quan,
Yi Yang
Abstract:
We present GvSeg, a general video segmentation framework for addressing four different video segmentation tasks (i.e., instance, semantic, panoptic, and exemplar-guided) while maintaining an identical architectural design. Currently, there is a trend towards develo** general video segmentation solutions that can be applied across multiple tasks. This streamlines research endeavors and simplifies…
▽ More
We present GvSeg, a general video segmentation framework for addressing four different video segmentation tasks (i.e., instance, semantic, panoptic, and exemplar-guided) while maintaining an identical architectural design. Currently, there is a trend towards develo** general video segmentation solutions that can be applied across multiple tasks. This streamlines research endeavors and simplifies deployment. However, such a highly homogenized framework in current design, where each element maintains uniformity, could overlook the inherent diversity among different tasks and lead to suboptimal performance. To tackle this, GvSeg: i) provides a holistic disentanglement and modeling for segment targets, thoroughly examining them from the perspective of appearance, position, and shape, and on this basis, ii) reformulates the query initialization, matching and sampling strategies in alignment with the task-specific requirement. These architecture-agnostic innovations empower GvSeg to effectively address each unique task by accommodating the specific properties that characterize them. Extensive experiments on seven gold-standard benchmark datasets demonstrate that GvSeg surpasses all existing specialized/general solutions by a significant margin on four different video segmentation tasks.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
A Two-stage Evolutionary Framework For Multi-objective Optimization
Authors:
Peng Chen,
**g Liang,
Kangjia Qiao,
Ponnuthurai Nagaratnam Suganthan,
Xuanxuan Ban
Abstract:
In the field of evolutionary multi-objective optimization, the approximation of the Pareto front (PF) is achieved by utilizing a collection of representative candidate solutions that exhibit desirable convergence and diversity. Although several multi-objective evolutionary algorithms (MOEAs) have been designed, they still have difficulties in kee** balance between convergence and diversity of po…
▽ More
In the field of evolutionary multi-objective optimization, the approximation of the Pareto front (PF) is achieved by utilizing a collection of representative candidate solutions that exhibit desirable convergence and diversity. Although several multi-objective evolutionary algorithms (MOEAs) have been designed, they still have difficulties in kee** balance between convergence and diversity of population. To better solve multi-objective optimization problems (MOPs), this paper proposes a Two-stage Evolutionary Framework For Multi-objective Optimization (TEMOF). Literally, algorithms are divided into two stages to enhance the search capability of the population. During the initial half of evolutions, parental selection is exclusively conducted from the primary population. Additionally, we not only perform environmental selection on the current population, but we also establish an external archive to store individuals situated on the first PF. Subsequently, in the second stage, parents are randomly chosen either from the population or the archive. In the experiments, one classic MOEA and two state-of-the-art MOEAs are integrated into the framework to form three new algorithms. The experimental results demonstrate the superior and robust performance of the proposed framework across a wide range of MOPs. Besides, the winner among three new algorithms is compared with several existing MOEAs and shows better results. Meanwhile, we conclude the reasons that why the two-stage framework is effect for the existing benchmark functions.
△ Less
Submitted 9 July, 2024;
originally announced July 2024.
-
Unveiling the Secrets of Vortex Neutron Decay
Authors:
Wei Kou,
Bing'ang Guo,
Xurong Chen
Abstract:
Investigation of decay and scattering processes of particles in a vortex state offers a novel and promising approach for probing particle structure. Our study reveals distinct properties of vortex neutron decay, which deviate from those of classical plane-wave neutron decay. We present the energy-angle distributions of the final-state electron and antineutrino in unpolarized vortex neutrons, as we…
▽ More
Investigation of decay and scattering processes of particles in a vortex state offers a novel and promising approach for probing particle structure. Our study reveals distinct properties of vortex neutron decay, which deviate from those of classical plane-wave neutron decay. We present the energy-angle distributions of the final-state electron and antineutrino in unpolarized vortex neutrons, as well as angle distributions integrated over their energies. Notably, we provide theoretical calculations of the decay behavior of neutrons with varying vortex cone angles and initial energies. We propose that identifying the vortex state of the initial neutron can be achieved by analyzing the angular and energy distributions of the final-state particles, introducing new degrees of freedom for studying weak interactions and neutron decay kinematics that have been previously overlooked in particle physics. This timely investigation takes advantage of recent advancements in vortex neutron preparation and analysis, opening up new avenues for exploring the fundamental properties of matter.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Graph Neural Networks and Deep Reinforcement Learning Based Resource Allocation for V2X Communications
Authors:
Maoxin Ji,
Qiong Wu,
**yi Fan,
Nan Cheng,
Wen Chen,
Jiangzhou Wang,
Khaled B. Letaief
Abstract:
In the rapidly evolving landscape of Internet of Vehicles (IoV) technology, Cellular Vehicle-to-Everything (C-V2X) communication has attracted much attention due to its superior performance in coverage, latency, and throughput. Resource allocation within C-V2X is crucial for ensuring the transmission of safety information and meeting the stringent requirements for ultra-low latency and high reliab…
▽ More
In the rapidly evolving landscape of Internet of Vehicles (IoV) technology, Cellular Vehicle-to-Everything (C-V2X) communication has attracted much attention due to its superior performance in coverage, latency, and throughput. Resource allocation within C-V2X is crucial for ensuring the transmission of safety information and meeting the stringent requirements for ultra-low latency and high reliability in Vehicle-to-Vehicle (V2V) communication. This paper proposes a method that integrates Graph Neural Networks (GNN) with Deep Reinforcement Learning (DRL) to address this challenge. By constructing a dynamic graph with communication links as nodes and employing the Graph Sample and Aggregation (GraphSAGE) model to adapt to changes in graph structure, the model aims to ensure a high success rate for V2V communication while minimizing interference on Vehicle-to-Infrastructure (V2I) links, thereby ensuring the successful transmission of V2V link information and maintaining high transmission rates for V2I links. The proposed method retains the global feature learning capabilities of GNN and supports distributed network deployment, allowing vehicles to extract low-dimensional features that include structural information from the graph network based on local observations and to make independent resource allocation decisions. Simulation results indicate that the introduction of GNN, with a modest increase in computational load, effectively enhances the decision-making quality of agents, demonstrating superiority to other methods. This study not only provides a theoretically efficient resource allocation strategy for V2V and V2I communications but also paves a new technical path for resource management in practical IoV environments.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Computer vision tasks for intelligent aerospace missions: An overview
Authors:
Huilin Chen,
Qiyu Sun,
Fangfei Li,
Yang Tang
Abstract:
Computer vision tasks are crucial for aerospace missions as they help spacecraft to understand and interpret the space environment, such as estimating position and orientation, reconstructing 3D models, and recognizing objects, which have been extensively studied to successfully carry out the missions. However, traditional methods like Kalman Filtering, Structure from Motion, and Multi-View Stereo…
▽ More
Computer vision tasks are crucial for aerospace missions as they help spacecraft to understand and interpret the space environment, such as estimating position and orientation, reconstructing 3D models, and recognizing objects, which have been extensively studied to successfully carry out the missions. However, traditional methods like Kalman Filtering, Structure from Motion, and Multi-View Stereo are not robust enough to handle harsh conditions, leading to unreliable results. In recent years, deep learning (DL)-based perception technologies have shown great potential and outperformed traditional methods, especially in terms of their robustness to changing environments. To further advance DL-based aerospace perception, various frameworks, datasets, and strategies have been proposed, indicating significant potential for future applications. In this survey, we aim to explore the promising techniques used in perception tasks and emphasize the importance of DL-based aerospace perception. We begin by providing an overview of aerospace perception, including classical space programs developed in recent years, commonly used sensors, and traditional perception methods. Subsequently, we delve into three fundamental perception tasks in aerospace missions: pose estimation, 3D reconstruction, and recognition, as they are basic and crucial for subsequent decision-making and control. Finally, we discuss the limitations and possibilities in current research and provide an outlook on future developments, including the challenges of working with limited datasets, the need for improved algorithms, and the potential benefits of multi-source information fusion.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.