-
Spatial-temporal Hierarchical Reinforcement Learning for Interpretable Pathology Image Super-Resolution
Authors:
Wenting Chen,
Jie Liu,
Tommy W. S. Chow,
Yixuan Yuan
Abstract:
Pathology image are essential for accurately interpreting lesion cells in cytopathology screening, but acquiring high-resolution digital slides requires specialized equipment and long scanning times. Though super-resolution (SR) techniques can alleviate this problem, existing deep learning models recover pathology image in a black-box manner, which can lead to untruthful biological details and mis…
▽ More
Pathology image are essential for accurately interpreting lesion cells in cytopathology screening, but acquiring high-resolution digital slides requires specialized equipment and long scanning times. Though super-resolution (SR) techniques can alleviate this problem, existing deep learning models recover pathology image in a black-box manner, which can lead to untruthful biological details and misdiagnosis. Additionally, current methods allocate the same computational resources to recover each pixel of pathology image, leading to the sub-optimal recovery issue due to the large variation of pathology image. In this paper, we propose the first hierarchical reinforcement learning framework named Spatial-Temporal hierARchical Reinforcement Learning (STAR-RL), mainly for addressing the aforementioned issues in pathology image super-resolution problem. We reformulate the SR problem as a Markov decision process of interpretable operations and adopt the hierarchical recovery mechanism in patch level, to avoid sub-optimal recovery. Specifically, the higher-level spatial manager is proposed to pick out the most corrupted patch for the lower-level patch worker. Moreover, the higher-level temporal manager is advanced to evaluate the selected patch and determine whether the optimization should be stopped earlier, thereby avoiding the over-processed problem. Under the guidance of spatial-temporal managers, the lower-level patch worker processes the selected patch with pixel-wise interpretable actions at each time step. Experimental results on medical images degraded by different kernels show the effectiveness of STAR-RL. Furthermore, STAR-RL validates the promotion in tumor diagnosis with a large margin and shows generalizability under various degradations. The source code is available at https://github.com/CUHK-AIM-Group/STAR-RL.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Triage of 3D pathology data via 2.5D multiple-instance learning to guide pathologist assessments
Authors:
Gan Gao,
Andrew H. Song,
Fiona Wang,
David Brenes,
Rui Wang,
Sarah S. L. Chow,
Kevin W. Bishop,
Lawrence D. True,
Faisal Mahmood,
Jonathan T. C. Liu
Abstract:
Accurate patient diagnoses based on human tissue biopsies are hindered by current clinical practice, where pathologists assess only a limited number of thin 2D tissue slices sectioned from 3D volumetric tissue. Recent advances in non-destructive 3D pathology, such as open-top light-sheet microscopy, enable comprehensive imaging of spatially heterogeneous tissue morphologies, offering the feasibili…
▽ More
Accurate patient diagnoses based on human tissue biopsies are hindered by current clinical practice, where pathologists assess only a limited number of thin 2D tissue slices sectioned from 3D volumetric tissue. Recent advances in non-destructive 3D pathology, such as open-top light-sheet microscopy, enable comprehensive imaging of spatially heterogeneous tissue morphologies, offering the feasibility to improve diagnostic determinations. A potential early route towards clinical adoption for 3D pathology is to rely on pathologists for final diagnosis based on viewing familiar 2D H&E-like image sections from the 3D datasets. However, manual examination of the massive 3D pathology datasets is infeasible. To address this, we present CARP3D, a deep learning triage approach that automatically identifies the highest-risk 2D slices within 3D volumetric biopsy, enabling time-efficient review by pathologists. For a given slice in the biopsy, we estimate its risk by performing attention-based aggregation of 2D patches within each slice, followed by pooling of the neighboring slices to compute a context-aware 2.5D risk score. For prostate cancer risk stratification, CARP3D achieves an area under the curve (AUC) of 90.4% for triaging slices, outperforming methods relying on independent analysis of 2D sections (AUC=81.3%). These results suggest that integrating additional depth context enhances the model's discriminative capabilities. In conclusion, CARP3D has the potential to improve pathologist diagnosis via accurate triage of high-risk slices within large-volume 3D pathology datasets.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
Distributionally Robust Degree Optimization for BATS Codes
Authors:
Hoover H. F. Yin,
Jie Wang,
Sherman S. M. Chow
Abstract:
Batched sparse (BATS) code is a network coding solution for multi-hop wireless networks with packet loss. Achieving a close-to-optimal rate relies on an optimal degree distribution. Technical challenges arise from the sensitivity of this distribution to the often empirically obtained rank distribution at the destination node. Specifically, if the empirical distribution overestimates the channel, B…
▽ More
Batched sparse (BATS) code is a network coding solution for multi-hop wireless networks with packet loss. Achieving a close-to-optimal rate relies on an optimal degree distribution. Technical challenges arise from the sensitivity of this distribution to the often empirically obtained rank distribution at the destination node. Specifically, if the empirical distribution overestimates the channel, BATS codes experience a significant rate degradation, leading to unstable rates across different runs and hence unpredictable transmission costs. Confronting this unresolved obstacle, we introduce a formulation for distributionally robust optimization in degree optimization. Deploying the resulting degree distribution resolves the instability of empirical rank distributions, ensuring a close-to-optimal rate, and unleashing the potential of applying BATS codes in real-world scenarios.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Expansion properties of polynomials over finite fields
Authors:
Nuno Arala,
Sam Chow
Abstract:
We establish expansion properties for suitably generic polynomials of degree $d$ in $d+1$ variables over finite fields. In particular, we show that if $P\in\mathbb{F}_q[x_1,\ldots,x_{d+1}]$ is a polynomial of degree $d$ coming from an explicit, Zariski dense set, and $X_1,\ldots,X_{d+1}\subseteq\mathbb{F}_q$ are suitably large, then $|P(X_1,\ldots,X_{d+1})|=q-O(1)$. Our methods rely on a higher-de…
▽ More
We establish expansion properties for suitably generic polynomials of degree $d$ in $d+1$ variables over finite fields. In particular, we show that if $P\in\mathbb{F}_q[x_1,\ldots,x_{d+1}]$ is a polynomial of degree $d$ coming from an explicit, Zariski dense set, and $X_1,\ldots,X_{d+1}\subseteq\mathbb{F}_q$ are suitably large, then $|P(X_1,\ldots,X_{d+1})|=q-O(1)$. Our methods rely on a higher-degree extension of a result of Vinh on point--line incidences over a finite field.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Counting rationals and diophantine approximation in missing-digit Cantor sets
Authors:
Sam Chow,
Peter Varju,
Han Yu
Abstract:
We establish a new upper bound for the number of rationals up to a given height in a missing-digit set, making progress towards a conjecture of Broderick, Fishman, and Reich. This enables us to make novel progress towards another conjecture of those authors about the corresponding intrinsic diophantine approximation problem. Moreover, we make further progress towards conjectures of Bugeaud--Durand…
▽ More
We establish a new upper bound for the number of rationals up to a given height in a missing-digit set, making progress towards a conjecture of Broderick, Fishman, and Reich. This enables us to make novel progress towards another conjecture of those authors about the corresponding intrinsic diophantine approximation problem. Moreover, we make further progress towards conjectures of Bugeaud--Durand and Levesley--Salp--Velani on the distribution of diophantine exponents in missing-digit sets.
A key tool in our study is Fourier $\ell^1$ dimension introduced by the last named author in [H. Yu, Rational points near self-similar sets, arXiv:2101.05910]. An important technical contribution of the paper is a method to compute this quantity.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Arithmetic Ramsey theory over the primes
Authors:
Jonathan Chapman,
Sam Chow
Abstract:
We study density and partition properties of polynomial equations in prime variables. We consider equations of the form $a_1h(x_1) + \cdots + a_sh(x_s)=b$, where the $a_i$ and $b$ are fixed coefficients, and $h$ is an arbitrary integer polynomial of degree $d$. Provided there are at least $(1+o(1))d^2$ variables, we establish necessary and sufficient criteria for this equation to have a monochroma…
▽ More
We study density and partition properties of polynomial equations in prime variables. We consider equations of the form $a_1h(x_1) + \cdots + a_sh(x_s)=b$, where the $a_i$ and $b$ are fixed coefficients, and $h$ is an arbitrary integer polynomial of degree $d$. Provided there are at least $(1+o(1))d^2$ variables, we establish necessary and sufficient criteria for this equation to have a monochromatic non-constant solution with respect to any finite colouring of the prime numbers. We similarly characterise when such equations admit solutions over any set of primes with positive relative upper density. In both cases, we obtain counting results which provide asymptotically sharp lower bounds for the number of monochromatic or dense solutions in primes. Our main new ingredient is a uniform lower bound on the cardinality of a prime polynomial Bohr set.
△ Less
Submitted 17 January, 2024;
originally announced January 2024.
-
Inhomogeneous Kaufman Measures and Diophantine Approximation
Authors:
Sam Chow,
Agamemnon Zafeiropoulos,
Evgeniy Zorin
Abstract:
We introduce an inhomogeneous variant of Kaufman's measure, with applications to diophantine approximation. In particular, we make progress towards a problem related to Littlewood's conjecture.
We introduce an inhomogeneous variant of Kaufman's measure, with applications to diophantine approximation. In particular, we make progress towards a problem related to Littlewood's conjecture.
△ Less
Submitted 24 December, 2023;
originally announced December 2023.
-
Dosimetric calibration of an anatomically specific ultra-high dose rate electron irradiation platform for preclinical FLASH radiobiology experiments
Authors:
**ghui Wang,
Stavros Melemenidis,
Rakesh Manjappa,
Vignesh Viswanathan,
Ramish M. Ashraf,
Karen Levy,
Lawrie Skinner,
Luis A. Soto,
Stephanie Chow,
Brianna Lau,
Ryan B. Ko,
Edward E. Graves,
Amy S. Yu,
Karl K. Bush,
Murat Surucu,
Erinn B. Rankin,
Billy W. Loo Jr,
Emil Schüler,
Peter G. Maxim
Abstract:
We characterized the dosimetric properties of a clinical linear accelerator configured to deliver ultra-high dose rate (UHDR) irradiation to mice and cell-culture FLASH radiobiology experiments. UHDR electron beams were controlled by a microcontroller and relay interfaced with the respiratory gating system. We produced beam collimators with indexed stereotactic mouse positioning devices to provide…
▽ More
We characterized the dosimetric properties of a clinical linear accelerator configured to deliver ultra-high dose rate (UHDR) irradiation to mice and cell-culture FLASH radiobiology experiments. UHDR electron beams were controlled by a microcontroller and relay interfaced with the respiratory gating system. We produced beam collimators with indexed stereotactic mouse positioning devices to provide anatomically specific preclinical treatments. Treatment delivery was monitored directly with an ionization chamber, and charge measurements were correlated with radiochromic film at the entry surface of the mice. The setup for conventional (CONV) dose rate irradiation was similar but the source-to-surface distance was longer. Monte Carlo simulations and film dosimetry were used to characterize beam properties and dose distributions. The mean electron beam energies before the flattening filter were 18.8 MeV (UHDR) and 17.7 MeV (CONV), with corresponding values at the mouse surface of 17.2 MeV and 16.2 MeV. The charges measured with an external ion chamber were linearly correlated with the mouse entrance dose. Use of relay gating for pulse control initially led to a delivery failure rate of 20% ($+/-$ 1 pulse); adjustments to account for the linac latency improved this rate to <1/20. Beam field sizes for two anatomically specific mouse collimators (4x4 $cm^2$ for whole-abdomen and 1.5x1.5 $cm^2$ for unilateral lung irradiation) were accurate within <5% and had low radiation leakage (<4%). Normalizing the dose at the center of the mouse (~0.75 cm depth) produced UHDR and CONV doses to the irradiated volumes with >95% agreement. We successfully configured a clinical linear accelerator for increased output and developed a robust preclinical platform for anatomically specific irradiation, with highly accurate and precise temporal and spatial dose delivery, for both CONV and UHDR applications.
△ Less
Submitted 17 December, 2023;
originally announced December 2023.
-
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass
Authors:
Minxin Du,
Xiang Yue,
Sherman S. M. Chow,
Tianhao Wang,
Chenyu Huang,
Huan Sun
Abstract:
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-tune large pre-trained language models (LMs).…
▽ More
Differentially private stochastic gradient descent (DP-SGD) adds noise to gradients in back-propagation, safeguarding training data from privacy leakage, particularly membership inference. It fails to cover (inference-time) threats like embedding inversion and sensitive attribute inference. It is also costly in storage and computation when used to fine-tune large pre-trained language models (LMs).
We propose DP-Forward, which directly perturbs embedding matrices in the forward pass of LMs. It satisfies stringent local DP requirements for training and inference data. To instantiate it using the smallest matrix-valued noise, we devise an analytic matrix Gaussian~mechanism (aMGM) by drawing possibly non-i.i.d. noise from a matrix Gaussian distribution. We then investigate perturbing outputs from different hidden (sub-)layers of LMs with aMGM noises. Its utility on three typical tasks almost hits the non-private baseline and outperforms DP-SGD by up to 7.7pp at a moderate privacy level. It saves 3$\times$ time and memory costs compared to DP-SGD with the latest high-speed library. It also reduces the average success rates of embedding inversion and sensitive attribute inference by up to 88pp and 41pp, respectively, whereas DP-SGD fails.
△ Less
Submitted 19 September, 2023; v1 submitted 13 September, 2023;
originally announced September 2023.
-
On the variance of the Fibonacci partition function
Authors:
Sam Chow,
Owen Jones
Abstract:
We determine the order of magnitude of the variance of the Fibonacci partition function. The answer is different to the most naive guess. The proof involves a diophantine system and an inhomogeneous linear recurrence.
We determine the order of magnitude of the variance of the Fibonacci partition function. The answer is different to the most naive guess. The proof involves a diophantine system and an inhomogeneous linear recurrence.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
Dispersion and Littlewood's conjecture
Authors:
Sam Chow,
Niclas Technau
Abstract:
Let $\varepsilon>0$. We construct an explicit, full-measure set of $α\in[0,1]$ such that if $γ\in \mathbb{R}$ then, for almost all $β\in[0,1]$, if $δ\in \mathbb{R}$ then there are infinitely many integers $n\geq 1$ for which \[ n \Vert nα- γ\Vert \cdot \Vert nβ- δ\Vert < \frac{(\log \log n)^{3 + \varepsilon}}{\log n}. \] This is a significant quantitative improvement over a result of the first aut…
▽ More
Let $\varepsilon>0$. We construct an explicit, full-measure set of $α\in[0,1]$ such that if $γ\in \mathbb{R}$ then, for almost all $β\in[0,1]$, if $δ\in \mathbb{R}$ then there are infinitely many integers $n\geq 1$ for which \[ n \Vert nα- γ\Vert \cdot \Vert nβ- δ\Vert < \frac{(\log \log n)^{3 + \varepsilon}}{\log n}. \] This is a significant quantitative improvement over a result of the first author and Zafeiropoulos. We show, moreover, that the exceptional set of $β$ has Fourier dimension zero, alongside further applications to badly approximable numbers and to lacunary diophantine approximation. Our method relies on a dispersion estimate and the Three Distance Theorem.
△ Less
Submitted 27 July, 2023;
originally announced July 2023.
-
Unconditionally Secure Access Control Encryption
Authors:
Cheuk Ting Li,
Sherman S. M. Chow
Abstract:
Access control encryption (ACE) enforces, through a sanitizer as the mediator, that only legitimate sender-receiver pairs can communicate, without the sanitizer knowing the communication metadata, including its sender and recipient identity, the policy over them, and the underlying plaintext. Any illegitimate transmission is indistinguishable from pure noise. Existing works focused on computationa…
▽ More
Access control encryption (ACE) enforces, through a sanitizer as the mediator, that only legitimate sender-receiver pairs can communicate, without the sanitizer knowing the communication metadata, including its sender and recipient identity, the policy over them, and the underlying plaintext. Any illegitimate transmission is indistinguishable from pure noise. Existing works focused on computational security and require trapdoor functions and possibly other heavyweight primitives. We present the first ACE scheme with information-theoretic security (unconditionally against unbounded adversaries). Our novel randomization techniques over matrices realize sanitization (traditionally via homomorphism over a fixed randomness space) such that the secret message in the hidden message subspace remains intact if and only if there is no illegitimate transmission.
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
Enumerative Galois theory for number fields
Authors:
Sam Chow,
Rainer Dietmann
Abstract:
Recently Bhargava counted number fields with prescribed Galois group. We improve the bound in four specific cases.
Recently Bhargava counted number fields with prescribed Galois group. We improve the bound in four specific cases.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Collaborative Residual Metric Learning
Authors:
Tianjun Wei,
Jianghong Ma,
Tommy W. S. Chow
Abstract:
In collaborative filtering, distance metric learning has been applied to matrix factorization techniques with promising results. However, matrix factorization lacks the ability of capturing collaborative information, which has been remarked by recent works and improved by interpreting user interactions as signals. This paper aims to find out how metric learning connect to these signal-based models…
▽ More
In collaborative filtering, distance metric learning has been applied to matrix factorization techniques with promising results. However, matrix factorization lacks the ability of capturing collaborative information, which has been remarked by recent works and improved by interpreting user interactions as signals. This paper aims to find out how metric learning connect to these signal-based models. By adopting a generalized distance metric, we discovered that in signal-based models, it is easier to estimate the residual of distances, which refers to the difference between the distances from a user to a target item and another item, rather than estimating the distances themselves. Further analysis also uncovers a link between the normalization strength of interaction signals and the novelty of recommendation, which has been overlooked by existing studies. Based on the above findings, we propose a novel model to learn a generalized distance user-item distance metric to capture user preference in interaction signals by modeling the residuals of distance. The proposed CoRML model is then further improved in training efficiency by a newly introduced approximated ranking weight. Extensive experiments conducted on 4 public datasets demonstrate the superior performance of CoRML compared to the state-of-the-art baselines in collaborative filtering, along with high efficiency and the ability of providing novelty-promoted recommendations, shedding new light on the study of metric learning-based recommender systems.
△ Less
Submitted 16 April, 2023;
originally announced April 2023.
-
Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning
Authors:
Rouzbeh Behnia,
Mohammadreza Ebrahimi,
Arman Riasi,
Sherman S. M. Chow,
Balaji Padmanabhan,
Thang Hoang
Abstract:
Secure aggregation protocols ensure the privacy of users' data in the federated learning settings by preventing the disclosure of users' local gradients. Despite their merits, existing aggregation protocols often incur high communication and computation overheads on the participants and might not be optimized to handle the large update vectors for machine learning models efficiently. This paper pr…
▽ More
Secure aggregation protocols ensure the privacy of users' data in the federated learning settings by preventing the disclosure of users' local gradients. Despite their merits, existing aggregation protocols often incur high communication and computation overheads on the participants and might not be optimized to handle the large update vectors for machine learning models efficiently. This paper presents e-SeaFL, an efficient, verifiable secure aggregation protocol taking one communication round in aggregation. e-SeaFL allows the aggregation server to generate proof of honest aggregation for the participants. Our core idea is to employ a set of assisting nodes to help the aggregation server, under similar trust assumptions existing works placed upon the participating users. For verifiability, e-SeaFL uses authenticated homomorphic vector commitments. Our experiments show that the user enjoys five orders of magnitude higher efficiency than the state of the art (PPML 2022) for a gradient vector of a high dimension up to $100,000$.
△ Less
Submitted 30 August, 2023; v1 submitted 7 April, 2023;
originally announced April 2023.
-
Drastic enhancement of the superconducting temperature in type-II Weyl semimetal candidate MoTe$_2$ via biaxial strain
Authors:
King Yau Yip,
Siu Tung Lam,
Kai Ham Yu,
Wing Shing Chow,
Jiayu Zeng,
Kwing To Lai,
Swee K. Goh
Abstract:
Type-II Weyl semimetal candidate MoTe$_2$, which superconducts at T_c~0.1 K, is one of the promising candidates for realizing topological superconductivity. However, the exceedingly low $T_c$ is associated with a small upper critical field ($H_{c2}$), implying a fragile superconducting phase that only exists on a small region of the $H$-$T$ phase diagram. Here, we describe a simple and versatile a…
▽ More
Type-II Weyl semimetal candidate MoTe$_2$, which superconducts at T_c~0.1 K, is one of the promising candidates for realizing topological superconductivity. However, the exceedingly low $T_c$ is associated with a small upper critical field ($H_{c2}$), implying a fragile superconducting phase that only exists on a small region of the $H$-$T$ phase diagram. Here, we describe a simple and versatile approach based on the differential thermal expansion between dissimilar materials to subject a thin single crystalline MoTe$_2$ to biaxial strain. With this approach, we successfully enhance the $T_c$ of MoTe$_2$ five-fold and consequently expand the superconducting region on the $H$-$T$ phase diagram significantly. To demonstrate the relative ease of studying the superconductivity in the biaxially strained MoTe$_2$, we further present the magnetotransport data, enabling the study of the temperature-dependent $H_{c2}$ and the anisotropy of the superconducting state which would otherwise be difficult to obtain in a free-standing MoTe$_2$. Our work shows that biaxial strain is an effective knob to tune the electronic properties of MoTe$_2$. Due to the simplicity of our methodology to apply biaxial strain, we anticipate its direct applicability to a wider class of quantum materials.
△ Less
Submitted 7 February, 2023; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication
Authors:
Shaoying Cai,
Yingjiu Li,
Changshe Ma,
Sherman S. M. Chow,
Robert H. Deng
Abstract:
Radio Frequency Identification (RFID) is a key technology used in many applications. In the past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication protocols as well as formal frameworks for evaluating them have been proposed. However, we notice that a property, namely proof of possession (PoP), has not been rigorously studied till now, despite it has significant value…
▽ More
Radio Frequency Identification (RFID) is a key technology used in many applications. In the past decades, plenty of secure and privacy-preserving RFID tag/mutual authentication protocols as well as formal frameworks for evaluating them have been proposed. However, we notice that a property, namely proof of possession (PoP), has not been rigorously studied till now, despite it has significant value in many RFID applications. For example, in RFID-enabled supply chains, PoP helps prevent dis-honest parties from publishing information about products/tags that they actually have never processed.
We propose the first formal framework for RFID tag/mutual authentication with PoP after correcting deficiencies of some existing RFID formal frameworks. We provide a generic construction to transform an RFID tag/mutual authentication protocol to one that supports PoP using a cryptographic hash function, a pseudorandom function (PRF) and a signature scheme. We prove that the constructed protocol is secure and privacy-preserving under our framework if all the building blocks possess desired security properties. Finally, we show an RFID mutual authentication protocol with PoP. Arming tag/mutual authentication protocols with PoP is an important step to strengthen RFID-enabled systems as it bridges the security gap between physical layer and data layer, and reduces the misuses of RFID-related data.
△ Less
Submitted 18 October, 2022;
originally announced October 2022.
-
Generalised Rado and Roth criteria
Authors:
Jonathan Chapman,
Sam Chow
Abstract:
We study the Ramsey properties of equations $a_1P(x_1) + \cdots + a_sP(x_s) = b$, where $a_1,\ldots,a_s,b$ are integers, and $P$ is an integer polynomial of degree $d$. Provided there are at least $(1+o(1))d^2$ variables, we show that Rado's criterion and an intersectivity condition completely characterise which equations of this form admit monochromatic solutions with respect to an arbitrary fini…
▽ More
We study the Ramsey properties of equations $a_1P(x_1) + \cdots + a_sP(x_s) = b$, where $a_1,\ldots,a_s,b$ are integers, and $P$ is an integer polynomial of degree $d$. Provided there are at least $(1+o(1))d^2$ variables, we show that Rado's criterion and an intersectivity condition completely characterise which equations of this form admit monochromatic solutions with respect to an arbitrary finite colouring of the positive integers. Furthermore, we obtain a Roth-type theorem for these equations, showing that they admit non-constant solutions over any set of integers with positive upper density if and only if $b= a_1 + \cdots + a_s = 0$. In addition, we establish sharp asymptotic lower bounds for the number of monochromatic/dense solutions (supersaturation).
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
Modeling sequential annotations for sequence labeling with crowds
Authors:
Xiaolei Lu,
Tommy W. S. Chow
Abstract:
Crowd sequential annotations can be an efficient and cost-effective way to build large datasets for sequence labeling. Different from tagging independent instances, for crowd sequential annotations the quality of label sequence relies on the expertise level of annotators in capturing internal dependencies for each token in the sequence. In this paper, we propose Modeling sequential annotation for…
▽ More
Crowd sequential annotations can be an efficient and cost-effective way to build large datasets for sequence labeling. Different from tagging independent instances, for crowd sequential annotations the quality of label sequence relies on the expertise level of annotators in capturing internal dependencies for each token in the sequence. In this paper, we propose Modeling sequential annotation for sequence labeling with crowds (SA-SLC). First, a conditional probabilistic model is developed to jointly model sequential data and annotators' expertise, in which categorical distribution is introduced to estimate the reliability of each annotator in capturing local and non-local label dependency for sequential annotation. To accelerate the marginalization of the proposed model, a valid label sequence inference (VLSE) method is proposed to derive the valid ground-truth label sequences from crowd sequential annotations. VLSE derives possible ground-truth labels from the token-wise level and further prunes sub-paths in the forward inference for label sequence decoding. VLSE reduces the number of candidate label sequences and improves the quality of possible ground-truth label sequences. The experimental results on several sequence labeling tasks of Natural Language Processing show the effectiveness of the proposed model.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Weak Disambiguation for Partial Structured Output Learning
Authors:
Xiaolei Lu,
Tommy W. S. Chow
Abstract:
Existing disambiguation strategies for partial structured output learning just cannot generalize well to solve the problem that there are some candidates which can be false positive or similar to the ground-truth label. In this paper, we propose a novel weak disambiguation for partial structured output learning (WD-PSL). First, a piecewise large margin formulation is generalized to partial structu…
▽ More
Existing disambiguation strategies for partial structured output learning just cannot generalize well to solve the problem that there are some candidates which can be false positive or similar to the ground-truth label. In this paper, we propose a novel weak disambiguation for partial structured output learning (WD-PSL). First, a piecewise large margin formulation is generalized to partial structured output learning, which effectively avoids handling large number of candidate structured outputs for complex structures. Second, in the proposed weak disambiguation strategy, each candidate label is assigned with a confidence value indicating how likely it is the true label, which aims to reduce the negative effects of wrong ground-truth label assignment in the learning process. Then two large margins are formulated to combine two types of constraints which are the disambiguation between candidates and non-candidates, and the weak disambiguation for candidates. In the framework of alternating optimization, a new 2n-slack variables cutting plane algorithm is developed to accelerate each iteration of optimization. The experimental results on several sequence labeling tasks of Natural Language Processing show the effectiveness of the proposed model.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Partial sequence labeling with structured Gaussian Processes
Authors:
Xiaolei Lu,
Tommy W. S. Chow
Abstract:
Existing partial sequence labeling models mainly focus on max-margin framework which fails to provide an uncertainty estimation of the prediction. Further, the unique ground truth disambiguation strategy employed by these models may include wrong label information for parameter learning. In this paper, we propose structured Gaussian Processes for partial sequence labeling (SGPPSL), which encodes u…
▽ More
Existing partial sequence labeling models mainly focus on max-margin framework which fails to provide an uncertainty estimation of the prediction. Further, the unique ground truth disambiguation strategy employed by these models may include wrong label information for parameter learning. In this paper, we propose structured Gaussian Processes for partial sequence labeling (SGPPSL), which encodes uncertainty in the prediction and does not need extra effort for model selection and hyperparameter learning. The model employs factor-as-piece approximation that divides the linear-chain graph structure into the set of pieces, which preserves the basic Markov Random Field structure and effectively avoids handling large number of candidate output sequences generated by partially annotated data. Then confidence measure is introduced in the model to address different contributions of candidate labels, which enables the ground-truth label information to be utilized in parameter learning. Based on the derived lower bound of the variational lower bound of the proposed model, variational parameters and confidence measures are estimated in the framework of alternating optimization. Moreover, weighted Viterbi algorithm is proposed to incorporate confidence measure to sequence prediction, which considers label ambiguity arose from multiple annotations in the training data and thus helps improve the performance. SGPPSL is evaluated on several sequence labeling tasks and the experimental results show the effectiveness of the proposed model.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Duration modeling with semi-Markov Conditional Random Fields for keyphrase extraction
Authors:
Xiaolei Lu,
Tommy W. S. Chow
Abstract:
Existing methods for keyphrase extraction need preprocessing to generate candidate phrase or post-processing to transform keyword into keyphrase. In this paper, we propose a novel approach called duration modeling with semi-Markov Conditional Random Fields (DM-SMCRFs) for keyphrase extraction. First of all, based on the property of semi-Markov chain, DM-SMCRFs can encode segment-level features and…
▽ More
Existing methods for keyphrase extraction need preprocessing to generate candidate phrase or post-processing to transform keyword into keyphrase. In this paper, we propose a novel approach called duration modeling with semi-Markov Conditional Random Fields (DM-SMCRFs) for keyphrase extraction. First of all, based on the property of semi-Markov chain, DM-SMCRFs can encode segment-level features and sequentially classify the phrase in the sentence as keyphrase or non-keyphrase. Second, by assuming the independence between state transition and state duration, DM-SMCRFs model the distribution of duration (length) of keyphrases to further explore state duration information, which can help identify the size of keyphrase. Based on the convexity of parametric duration feature derived from duration distribution, a constrained Viterbi algorithm is derived to improve the performance of decoding in DM-SMCRFs. We thoroughly evaluate the performance of DM-SMCRFs on the datasets from various domains. The experimental results demonstrate the effectiveness of proposed model.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Fine-tuning Partition-aware Item Similarities for Efficient and Scalable Recommendation
Authors:
Tianjun Wei,
Jianghong Ma,
Tommy W. S. Chow
Abstract:
Collaborative filtering (CF) is widely searched in recommendation with various types of solutions. Recent success of Graph Convolution Networks (GCN) in CF demonstrates the effectiveness of modeling high-order relationships through graphs, while repetitive graph convolution and iterative batch optimization limit their efficiency. Instead, item similarity models attempt to construct direct relation…
▽ More
Collaborative filtering (CF) is widely searched in recommendation with various types of solutions. Recent success of Graph Convolution Networks (GCN) in CF demonstrates the effectiveness of modeling high-order relationships through graphs, while repetitive graph convolution and iterative batch optimization limit their efficiency. Instead, item similarity models attempt to construct direct relationships through efficient interaction encoding. Despite their great performance, the growing item numbers result in quadratic growth in similarity modeling process, posing critical scalability problems. In this paper, we investigate the graph sampling strategy adopted in latest GCN model for efficiency improving, and identify the potential item group structure in the sampled graph. Based on this, we propose a novel item similarity model which introduces graph partitioning to restrict the item similarity modeling within each partition. Specifically, we show that the spectral information of the original graph is well in preserving global-level information. Then, it is added to fine-tune local item similarities with a new data augmentation strategy acted as partition-aware prior knowledge, jointly to cope with the information loss brought by partitioning. Experiments carried out on 4 datasets show that the proposed model outperforms state-of-the-art GCN models with 10x speed-up and item similarity models with 95\% parameter storage savings.
△ Less
Submitted 10 February, 2023; v1 submitted 13 July, 2022;
originally announced July 2022.
-
Beyond the Gates of Euclidean Space: Temporal-Discrimination-Fusions and Attention-based Graph Neural Network for Human Activity Recognition
Authors:
Nafees Ahmad,
Savio Ho-Chit Chow,
Ho-fung Leung
Abstract:
Human activity recognition (HAR) through wearable devices has received much interest due to its numerous applications in fitness tracking, wellness screening, and supported living. As a result, we have seen a great deal of work in this field. Traditional deep learning (DL) has set a state of the art performance for HAR domain. However, it ignores the data's structure and the association between co…
▽ More
Human activity recognition (HAR) through wearable devices has received much interest due to its numerous applications in fitness tracking, wellness screening, and supported living. As a result, we have seen a great deal of work in this field. Traditional deep learning (DL) has set a state of the art performance for HAR domain. However, it ignores the data's structure and the association between consecutive time stamps. To address this constraint, we offer an approach based on Graph Neural Networks (GNNs) for structuring the input representation and exploiting the relations among the samples. However, even when using a simple graph convolution network to eliminate this shortage, there are still several limiting factors, such as inter-class activities issues, skewed class distribution, and a lack of consideration for sensor data priority, all of which harm the HAR model's performance. To improve the current HAR model's performance, we investigate novel possibilities within the framework of graph structure to achieve highly discriminated and rich activity features. We propose a model for (1) time-series-graph module that converts raw data from HAR dataset into graphs; (2) Graph Convolutional Neural Networks (GCNs) to discover local dependencies and correlations between neighboring nodes; and (3) self-attention GNN encoder to identify sensors interactions and data priorities. To the best of our knowledge, this is the first work for HAR, which introduces a GNN-based approach that incorporates both the GCN and the attention mechanism. By employing a uniform evaluation method, our framework significantly improves the performance on hospital patient's activities dataset comparatively considered other state of the art baseline methods.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
A note on dyadic approximation in Cantor's set
Authors:
Demi Allen,
Simon Baker,
Sam Chow,
Han Yu
Abstract:
We consider the convergence theory for dyadic approximation in the middle-third Cantor set, $K$, for approximation functions of the form $ψ_τ(n) = n^{-τ}$ ($τ\ge 0$). In particular, we show that for values of $τ$ beyond a certain threshold we have that almost no point in $K$ is dyadically $ψ_τ$-well approximable with respect to the natural probability measure on $K$. This refines a previous result…
▽ More
We consider the convergence theory for dyadic approximation in the middle-third Cantor set, $K$, for approximation functions of the form $ψ_τ(n) = n^{-τ}$ ($τ\ge 0$). In particular, we show that for values of $τ$ beyond a certain threshold we have that almost no point in $K$ is dyadically $ψ_τ$-well approximable with respect to the natural probability measure on $K$. This refines a previous result in this direction obtained by the first, third, and fourth named authors (arXiv, 2020).
△ Less
Submitted 20 April, 2022;
originally announced April 2022.
-
Counting multiplicative approximations
Authors:
Sam Chow,
Niclas Technau
Abstract:
A famous conjecture of Littlewood (c. 1930) concerns approximating two real numbers by rationals of the same denominator, multiplying the errors. In a lesser-known paper, Wang and Yu (1981) established an asymptotic formula for the number of such approximations, valid almost always. Using the quantitative Koukoulopoulos--Maynard theorem of Aistleitner--Borda--Hauke, together with bounds arising fr…
▽ More
A famous conjecture of Littlewood (c. 1930) concerns approximating two real numbers by rationals of the same denominator, multiplying the errors. In a lesser-known paper, Wang and Yu (1981) established an asymptotic formula for the number of such approximations, valid almost always. Using the quantitative Koukoulopoulos--Maynard theorem of Aistleitner--Borda--Hauke, together with bounds arising from the theory of Bohr sets, we deduce lower bounds of the expected order of magnitude for inhomogeneous and fibre refinements of the problem.
△ Less
Submitted 19 March, 2022;
originally announced March 2022.
-
Parity flip** mediated by a quantum dot in Majorana Josephson junctions
Authors:
Shanbo Chow,
Zhi Wang,
Dao-Xin Yao
Abstract:
The detection of the Majorana bound states (MBSs) is a central issue in the current investigation of the topological superconductors, and the topological Josephson junction is an important system for resolving this issue. In this work, we introduce an external quantum dot (QD) to Majorana Josephson junctions (MJJs), and study the parity flip** of the junction induced by the coupling between the…
▽ More
The detection of the Majorana bound states (MBSs) is a central issue in the current investigation of the topological superconductors, and the topological Josephson junction is an important system for resolving this issue. In this work, we introduce an external quantum dot (QD) to Majorana Josephson junctions (MJJs), and study the parity flip** of the junction induced by the coupling between the QD and the MBSs. We demonstrate Landau-Zener (LZ) transitions between opposite Majorana parity states when the energy level of the QD is modulated. The resulted parity flip** processes exhibit voltage signals across the junction. In the presence of a periodic modulation on the QD level, we show Landau-Zener-Stückelberg (LZS) interference on the parity states. We demonstrate distinctive interference patterns at distinct driving frequencies. These results can be used as signals for detecting the existence of the MBSs.
△ Less
Submitted 5 June, 2023; v1 submitted 7 March, 2022;
originally announced March 2022.
-
Towards van der Waerden's conjecture
Authors:
Sam Chow,
Rainer Dietmann
Abstract:
How often is a quintic polynomial solvable by radicals? We establish that the number of such polynomials, monic and irreducible with integer coefficients in $[-H,H]$, is $O(H^{3.91})$. More generally, we show that if $n \ge 3$ and $n \notin \{ 7, 8, 10 \}$ then there are $O(H^{n-1.017})$ monic, irreducible polynomials of degree $n$ with integer coefficients in $[-H,H]$ and Galois group not contain…
▽ More
How often is a quintic polynomial solvable by radicals? We establish that the number of such polynomials, monic and irreducible with integer coefficients in $[-H,H]$, is $O(H^{3.91})$. More generally, we show that if $n \ge 3$ and $n \notin \{ 7, 8, 10 \}$ then there are $O(H^{n-1.017})$ monic, irreducible polynomials of degree $n$ with integer coefficients in $[-H,H]$ and Galois group not containing $A_n$. Save for the alternating group and degrees $7,8,10$, this establishes a 1936 conjecture of van der Waerden.
△ Less
Submitted 30 January, 2023; v1 submitted 28 June, 2021;
originally announced June 2021.
-
Differential Privacy for Text Analytics via Natural Text Sanitization
Authors:
Xiang Yue,
Minxin Du,
Tianhao Wang,
Yaliang Li,
Huan Sun,
Sherman S. M. Chow
Abstract:
Texts convey sophisticated knowledge. However, texts also convey sensitive information. Despite the success of general-purpose language models and domain-specific mechanisms with differential privacy (DP), existing text sanitization mechanisms still provide low utility, as cursed by the high-dimensional text representation. The companion issue of utilizing sanitized texts for downstream analytics…
▽ More
Texts convey sophisticated knowledge. However, texts also convey sensitive information. Despite the success of general-purpose language models and domain-specific mechanisms with differential privacy (DP), existing text sanitization mechanisms still provide low utility, as cursed by the high-dimensional text representation. The companion issue of utilizing sanitized texts for downstream analytics is also under-explored. This paper takes a direct approach to text sanitization. Our insight is to consider both sensitivity and similarity via our new local DP notion. The sanitized texts also contribute to our sanitization-aware pretraining and fine-tuning, enabling privacy-preserving natural language processing over the BERT language model with promising utility. Surprisingly, the high utility does not boost up the success rate of inference attacks.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Fully Inhomogeneous Multiplicative Diophantine Approximation of Badly Approximable Numbers
Authors:
Sam Chow,
Agamemnon Zafeiropoulos
Abstract:
We establish a strong form of Littlewood's conjecture with inhomogeneous shifts, for a full-dimensional set of pairs of badly approximable numbers on a vertical line. We also prove a uniform assertion of this nature, generalising a strong form of a result by Haynes, Jensen and Kristensen. Finally, we establish a similar result involving inhomogeneously badly approximable numbers, making progress t…
▽ More
We establish a strong form of Littlewood's conjecture with inhomogeneous shifts, for a full-dimensional set of pairs of badly approximable numbers on a vertical line. We also prove a uniform assertion of this nature, generalising a strong form of a result by Haynes, Jensen and Kristensen. Finally, we establish a similar result involving inhomogeneously badly approximable numbers, making progress towards a problem posed by Pollington, Velani, Zafeiropoulos and Zorin.
△ Less
Submitted 12 March, 2021; v1 submitted 5 March, 2021;
originally announced March 2021.
-
Littlewood and Duffin--Schaeffer-type problems in diophantine approximation
Authors:
Sam Chow,
Niclas Technau
Abstract:
Gallagher's theorem describes the multiplicative diophantine approximation rate of a typical vector. We establish a fully-inhomogeneous version of Gallagher's theorem, a diophantine fibre refinement, and a sharp and unexpected threshold for Liouville fibres. Along the way, we prove an inhomogeneous version of the Duffin--Schaeffer conjecture for a class of non-monotonic approximation functions.
Gallagher's theorem describes the multiplicative diophantine approximation rate of a typical vector. We establish a fully-inhomogeneous version of Gallagher's theorem, a diophantine fibre refinement, and a sharp and unexpected threshold for Liouville fibres. Along the way, we prove an inhomogeneous version of the Duffin--Schaeffer conjecture for a class of non-monotonic approximation functions.
△ Less
Submitted 24 August, 2023; v1 submitted 18 October, 2020;
originally announced October 2020.
-
On Fibonacci partitions
Authors:
Sam Chow,
Tom Slattery
Abstract:
We prove an exact formula for OEIS A000119, which counts partitions into distinct Fibonacci numbers. We also establish an exact formula for its mean value, and determine the asymptotic behaviour.
We prove an exact formula for OEIS A000119, which counts partitions into distinct Fibonacci numbers. We also establish an exact formula for its mean value, and determine the asymptotic behaviour.
△ Less
Submitted 17 September, 2020;
originally announced September 2020.
-
A Square-Root Second-Order Extended Kalman Filtering Approach for Estimating Smoothly Time-Varying Parameters
Authors:
Zachary F. Fisher,
Sy-Miin Chow,
Peter C. M. Molenaar,
Barbara L. Fredrickson,
Vladas Pipiras,
Kathleen M. Gates
Abstract:
Researchers collecting intensive longitudinal data (ILD) are increasingly looking to model psychological processes, such as emotional dynamics, that organize and adapt across time in complex and meaningful ways. This is also the case for researchers looking to characterize the impact of an intervention on individual behavior. To be useful, statistical models must be capable of characterizing these…
▽ More
Researchers collecting intensive longitudinal data (ILD) are increasingly looking to model psychological processes, such as emotional dynamics, that organize and adapt across time in complex and meaningful ways. This is also the case for researchers looking to characterize the impact of an intervention on individual behavior. To be useful, statistical models must be capable of characterizing these processes as complex, time-dependent phenomenon, otherwise only a fraction of the system dynamics will be recovered. In this paper we introduce a Square-Root Second-Order Extended Kalman Filtering approach for estimating smoothly time-varying parameters. This approach is capable of handling dynamic factor models where the relations between variables underlying the processes of interest change in a manner that may be difficult to specify in advance. We examine the performance of our approach in a Monte Carlo simulation and show the proposed algorithm accurately recovers the unobserved states in the case of a bivariate dynamic factor model with time-varying dynamics and treatment effects. Furthermore, we illustrate the utility of our approach in characterizing the time-varying effect of a meditation intervention on day-to-day emotional experiences.
△ Less
Submitted 19 July, 2020;
originally announced July 2020.
-
Dyadic Approximation in the Middle-Third Cantor Set
Authors:
Demi Allen,
Sam Chow,
Han Yu
Abstract:
In this paper, we study the metric theory of dyadic approximation in the middle-third Cantor set. This theory complements earlier work of Levesley, Salp, and Velani (2007), who investigated the problem of approximation in the Cantor set by triadic rationals. We find that the behaviour when we consider dyadic approximation in the Cantor set is substantially different to considering triadic approxim…
▽ More
In this paper, we study the metric theory of dyadic approximation in the middle-third Cantor set. This theory complements earlier work of Levesley, Salp, and Velani (2007), who investigated the problem of approximation in the Cantor set by triadic rationals. We find that the behaviour when we consider dyadic approximation in the Cantor set is substantially different to considering triadic approximation in the Cantor set. In some sense, this difference in behaviour is a manifestation of Furstenberg's times 2 times 3 phenomenon from dynamical systems, which asserts that the base 2 and base 3 expansions of a number are not both structured.
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions
Authors:
Minghui Li,
Sherman S. M. Chow,
Shengshan Hu,
Yue**g Yan,
Chao Shen,
Qian Wang
Abstract:
Convolutional neural network is a machine-learning model widely applied in various prediction tasks, such as computer vision and medical image analysis. Their great predictive power requires extensive computation, which encourages model owners to host the prediction service in a cloud platform. Recent researches focus on the privacy of the query and results, but they do not provide model privacy a…
▽ More
Convolutional neural network is a machine-learning model widely applied in various prediction tasks, such as computer vision and medical image analysis. Their great predictive power requires extensive computation, which encourages model owners to host the prediction service in a cloud platform. Recent researches focus on the privacy of the query and results, but they do not provide model privacy against the model-hosting server and may leak partial information about the results. Some of them further require frequent interactions with the querier or heavy computation overheads, which discourages querier from using the prediction service. This paper proposes a new scheme for privacy-preserving neural network prediction in the outsourced setting, i.e., the server cannot learn the query, (intermediate) results, and the model. Similar to SecureML (S&P'17), a representative work that provides model privacy, we leverage two non-colluding servers with secret sharing and triplet generation to minimize the usage of heavyweight cryptography. Further, we adopt asynchronous computation to improve the throughput, and design garbled circuits for the non-polynomial activation function to keep the same accuracy as the underlying network (instead of approximating it). Our experiments on MNIST dataset show that our scheme achieves an average of 122x, 14.63x, and 36.69x reduction in latency compared to SecureML, MiniONN (CCS'17), and EzPC (EuroS&P'19), respectively. For the communication costs, our scheme outperforms SecureML by 1.09x, MiniONN by 36.69x, and EzPC by 31.32x on average. On the CIFAR dataset, our scheme achieves a lower latency by a factor of 7.14x and 3.48x compared to MiniONN and EzPC, respectively. Our scheme also provides 13.88x and 77.46x lower communication costs than MiniONN and EzPC on the CIFAR dataset.
△ Less
Submitted 29 June, 2020; v1 submitted 22 February, 2020;
originally announced February 2020.
-
Efficient Algorithms towards Network Intervention
Authors:
Hui-Ju Hung,
Wang-Chien Lee,
De-Nian Yang,
Chih-Ya Shen,
Zhen Lei,
Sy-Miin Chow
Abstract:
Research suggests that social relationships have substantial impacts on individuals' health outcomes. Network intervention, through careful planning, can assist a network of users to build healthy relationships. However, most previous work is not designed to assist such planning by carefully examining and improving multiple network characteristics. In this paper, we propose and evaluate algorithms…
▽ More
Research suggests that social relationships have substantial impacts on individuals' health outcomes. Network intervention, through careful planning, can assist a network of users to build healthy relationships. However, most previous work is not designed to assist such planning by carefully examining and improving multiple network characteristics. In this paper, we propose and evaluate algorithms that facilitate network intervention planning through simultaneous optimization of network degree, closeness, betweenness, and local clustering coefficient, under scenarios involving Network Intervention with Limited Degradation - for Single target (NILD-S) and Network Intervention with Limited Degradation - for Multiple targets (NILD-M). We prove that NILD-S and NILD-M are NP-hard and cannot be approximated within any ratio in polynomial time unless P=NP. We propose the Candidate Re-selection with Preserved Dependency (CRPD) algorithm for NILD-S, and the Objective-aware Intervention edge Selection and Adjustment (OISA) algorithm for NILD-M. Various pruning strategies are designed to boost the efficiency of the proposed algorithms. Extensive experiments on various real social networks collected from public schools and Web and an empirical study are conducted to show that CRPD and OISA outperform the baselines in both efficiency and effectiveness.
△ Less
Submitted 27 January, 2020;
originally announced January 2020.
-
Learning with fuzzy hypergraphs: a topical approach to query-oriented text summarization
Authors:
Hadrien Van Lierde,
Tommy W. S. Chow
Abstract:
Existing graph-based methods for extractive document summarization represent sentences of a corpus as the nodes of a graph or a hypergraph in which edges depict relationships of lexical similarity between sentences. Such approaches fail to capture semantic similarities between sentences when they express a similar information but have few words in common and are thus lexically dissimilar. To overc…
▽ More
Existing graph-based methods for extractive document summarization represent sentences of a corpus as the nodes of a graph or a hypergraph in which edges depict relationships of lexical similarity between sentences. Such approaches fail to capture semantic similarities between sentences when they express a similar information but have few words in common and are thus lexically dissimilar. To overcome this issue, we propose to extract semantic similarities based on topical representations of sentences. Inspired by the Hierarchical Dirichlet Process, we propose a probabilistic topic model in order to infer topic distributions of sentences. As each topic defines a semantic connection among a group of sentences with a certain degree of membership for each sentence, we propose a fuzzy hypergraph model in which nodes are sentences and fuzzy hyperedges are topics. To produce an informative summary, we extract a set of sentences from the corpus by simultaneously maximizing their relevance to a user-defined query, their centrality in the fuzzy hypergraph and their coverage of topics present in the corpus. We formulate a polynomial time algorithm building on the theory of submodular functions to solve the associated optimization problem. A thorough comparative analysis with other graph-based summarization systems is included in the paper. Our obtained results show the superiority of our method in terms of content coverage of the summaries.
△ Less
Submitted 22 June, 2019;
originally announced June 2019.
-
Wasserstein Hamiltonian flows
Authors:
Shui-Nee Chow,
Wuchen Li,
Haomin Zhou
Abstract:
We establish kinetic Hamiltonian flows in density space embedded with the $L^2$-Wasserstein metric tensor. We derive the Euler-Lagrange equation in density space, which introduces the associated Hamiltonian flows. We demonstrate that many classical equations, such as Vlasov equation, Schr{ö}dinger equation and Schr{ö}dinger bridge problem, can be rewritten as the formalism of Hamiltonian flows in…
▽ More
We establish kinetic Hamiltonian flows in density space embedded with the $L^2$-Wasserstein metric tensor. We derive the Euler-Lagrange equation in density space, which introduces the associated Hamiltonian flows. We demonstrate that many classical equations, such as Vlasov equation, Schr{ö}dinger equation and Schr{ö}dinger bridge problem, can be rewritten as the formalism of Hamiltonian flows in density space.
△ Less
Submitted 16 December, 2019; v1 submitted 4 March, 2019;
originally announced March 2019.
-
Effective equidistribution for multiplicative Diophantine approximation on lines
Authors:
Sam Chow,
Lei Yang
Abstract:
Given any line in the plane, we strengthen the Littlewood conjecture by two logarithms for almost every point on the line, thereby generalising the fibre result of Beresnevich, Haynes, and Velani. To achieve this, we prove an effective asymptotic equidistribution result for one-parameter unipotent orbits in $\mathrm{SL}(3, \mathbb{R})/\mathrm{SL}(3,\mathbb{Z})$. We also provide a complementary con…
▽ More
Given any line in the plane, we strengthen the Littlewood conjecture by two logarithms for almost every point on the line, thereby generalising the fibre result of Beresnevich, Haynes, and Velani. To achieve this, we prove an effective asymptotic equidistribution result for one-parameter unipotent orbits in $\mathrm{SL}(3, \mathbb{R})/\mathrm{SL}(3,\mathbb{Z})$. We also provide a complementary convergence statement, by develo** the structural theory of dual Bohr sets: at the cost of a slightly stronger Diophantine assumption, this sharpens a result of Kleinbock's from 2003. Finally, we refine the theory of logarithm laws in homogeneous spaces.
△ Less
Submitted 1 December, 2023; v1 submitted 16 February, 2019;
originally announced February 2019.
-
Query-oriented text summarization based on hypergraph transversals
Authors:
Hadrien Van Lierde,
Tommy W. S. Chow
Abstract:
Existing graph- and hypergraph-based algorithms for document summarization represent the sentences of a corpus as the nodes of a graph or a hypergraph in which the edges represent relationships of lexical similarities between sentences. Each sentence of the corpus is then scored individually, using popular node ranking algorithms, and a summary is produced by extracting highly scored sentences. Th…
▽ More
Existing graph- and hypergraph-based algorithms for document summarization represent the sentences of a corpus as the nodes of a graph or a hypergraph in which the edges represent relationships of lexical similarities between sentences. Each sentence of the corpus is then scored individually, using popular node ranking algorithms, and a summary is produced by extracting highly scored sentences. This approach fails to select a subset of jointly relevant sentences and it may produce redundant summaries that are missing important topics of the corpus. To alleviate this issue, a new hypergraph-based summarizer is proposed in this paper, in which each node is a sentence and each hyperedge is a theme, namely a group of sentences sharing a topic. Themes are weighted in terms of their prominence in the corpus and their relevance to a user-defined query. It is further shown that the problem of identifying a subset of sentences covering the relevant themes of the corpus is equivalent to that of finding a hypergraph transversal in our theme-based hypergraph. Two extensions of the notion of hypergraph transversal are proposed for the purpose of summarization, and polynomial time algorithms building on the theory of submodular functions are proposed for solving the associated discrete optimization problems. The worst-case time complexity of the proposed algorithms is squared in the number of terms, which makes it cheaper than the existing hypergraph-based methods. A thorough comparative analysis with related models on DUC benchmark datasets demonstrates the effectiveness of our approach, which outperforms existing graph- or hypergraph-based methods by at least 6% of ROUGE-SU4 score.
△ Less
Submitted 2 February, 2019;
originally announced February 2019.
-
Higher-rank Bohr sets and multiplicative diophantine approximation
Authors:
Sam Chow,
Niclas Technau
Abstract:
Gallagher's theorem is a sharpening and extension of the Littlewood conjecture that holds for almost all tuples of real numbers. We provide a fibre refinement, solving a problem posed by Beresnevich, Haynes and Velani in 2015. Hitherto, this was only known on the plane, as previous approaches relied heavily on the theory of continued fractions. Using reduced successive minima in lieu of continued…
▽ More
Gallagher's theorem is a sharpening and extension of the Littlewood conjecture that holds for almost all tuples of real numbers. We provide a fibre refinement, solving a problem posed by Beresnevich, Haynes and Velani in 2015. Hitherto, this was only known on the plane, as previous approaches relied heavily on the theory of continued fractions. Using reduced successive minima in lieu of continued fractions, we develop the structural theory of Bohr sets of arbitrary rank, in the context of diophantine approximation. In addition, we generalise the theory and result to the inhomogeneous setting. To deal with this inhomogeneity, we employ diophantine transference inequalities in lieu of the three distance theorem.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Diophantine transference inequalities: weighted, inhomogeneous, and intermediate exponents
Authors:
Sam Chow,
Anish Ghosh,
Lifan Guan,
Antoine Marnat,
David Simmons
Abstract:
We extend the Khintchine transference inequalities, as well as a homogeneous-inhomogeneous transference inequality for lattices, due to Bugeaud and Laurent, to a weighted setting. We also provide applications to inhomogeneous Diophantine approximation on manifolds and to weighted badly approximable vectors. Finally, we interpret and prove a conjecture of Beresnevich-Velani (2010) about inhomogeneo…
▽ More
We extend the Khintchine transference inequalities, as well as a homogeneous-inhomogeneous transference inequality for lattices, due to Bugeaud and Laurent, to a weighted setting. We also provide applications to inhomogeneous Diophantine approximation on manifolds and to weighted badly approximable vectors. Finally, we interpret and prove a conjecture of Beresnevich-Velani (2010) about inhomogeneous intermediate exponents.
△ Less
Submitted 27 March, 2019; v1 submitted 21 August, 2018;
originally announced August 2018.
-
Enumerative Galois theory for cubics and quartics
Authors:
Sam Chow,
Rainer Dietmann
Abstract:
We show that there are $O_\varepsilon(H^{1.5+\varepsilon})$ monic, cubic polynomials with integer coefficients bounded by $H$ in absolute value whose Galois group is $A_3$. We also show that the order of magnitude for $D_4$ quartics is $H^2 (\log H)^2$, and that the respective counts for $A_4$, $V_4$, $C_4$ are $O(H^{2.91})$, $O(H^2 \log H)$, $O(H^2 \log H)$. Our work establishes that irreducible…
▽ More
We show that there are $O_\varepsilon(H^{1.5+\varepsilon})$ monic, cubic polynomials with integer coefficients bounded by $H$ in absolute value whose Galois group is $A_3$. We also show that the order of magnitude for $D_4$ quartics is $H^2 (\log H)^2$, and that the respective counts for $A_4$, $V_4$, $C_4$ are $O(H^{2.91})$, $O(H^2 \log H)$, $O(H^2 \log H)$. Our work establishes that irreducible non-$S_3$ cubic polynomials are less numerous than reducible ones, and similarly in the quartic setting: these are the first two solved cases of a 1936 conjecture made by van der Waerden.
△ Less
Submitted 5 August, 2020; v1 submitted 16 July, 2018;
originally announced July 2018.
-
Rado's criterion over squares and higher powers
Authors:
Sam Chow,
Sofia Lindqvist,
Sean Prendiville
Abstract:
We establish partition regularity of the generalised Pythagorean equation in five or more variables. Furthermore, we show how Rado's characterisation of a partition regular equation remains valid over the set of positive $k$th powers, provided the equation has at least $(1+o(1))k\log k$ variables. We thus completely describe which diagonal forms are partition regular and which are not, given suffi…
▽ More
We establish partition regularity of the generalised Pythagorean equation in five or more variables. Furthermore, we show how Rado's characterisation of a partition regular equation remains valid over the set of positive $k$th powers, provided the equation has at least $(1+o(1))k\log k$ variables. We thus completely describe which diagonal forms are partition regular and which are not, given sufficiently many variables. In addition, we prove a supersaturated version of Rado's theorem for a linear equation restricted either to squares minus one or to logarithmically-smooth numbers.
△ Less
Submitted 19 September, 2018; v1 submitted 13 June, 2018;
originally announced June 2018.
-
Spectral clustering algorithms for the detection of clusters in block-cyclic and block-acyclic graphs
Authors:
H. Van Lierde,
T. W. S. Chow,
J. -C. Delvenne
Abstract:
We propose two spectral algorithms for partitioning nodes in directed graphs respectively with a cyclic and an acyclic pattern of connection between groups of nodes. Our methods are based on the computation of extremal eigenvalues of the transition matrix associated to the directed graph. The two algorithms outperform state-of-the art methods for directed graph clustering on synthetic datasets, in…
▽ More
We propose two spectral algorithms for partitioning nodes in directed graphs respectively with a cyclic and an acyclic pattern of connection between groups of nodes. Our methods are based on the computation of extremal eigenvalues of the transition matrix associated to the directed graph. The two algorithms outperform state-of-the art methods for directed graph clustering on synthetic datasets, including methods based on blockmodels, bibliometric symmetrization and random walks. Our algorithms have the same space complexity as classical spectral clustering algorithms for undirected graphs and their time complexity is also linear in the number of edges in the graph. One of our methods is applied to a trophic network based on predator-prey relationships. It successfully extracts common categories of preys and predators encountered in food chains. The same method is also applied to highlight the hierarchical structure of a worldwide network of Autonomous Systems depicting business agreements between Internet Service Providers.
△ Less
Submitted 2 May, 2018;
originally announced May 2018.
-
Exactly Robust Kernel Principal Component Analysis
Authors:
Jicong Fan,
Tommy W. S. Chow
Abstract:
Robust principal component analysis (RPCA) can recover low-rank matrices when they are corrupted by sparse noises. In practice, many matrices are, however, of high-rank and hence cannot be recovered by RPCA. We propose a novel method called robust kernel principal component analysis (RKPCA) to decompose a partially corrupted matrix as a sparse matrix plus a high or full-rank matrix with low latent…
▽ More
Robust principal component analysis (RPCA) can recover low-rank matrices when they are corrupted by sparse noises. In practice, many matrices are, however, of high-rank and hence cannot be recovered by RPCA. We propose a novel method called robust kernel principal component analysis (RKPCA) to decompose a partially corrupted matrix as a sparse matrix plus a high or full-rank matrix with low latent dimensionality. RKPCA can be applied to many problems such as noise removal and subspace clustering and is still the only unsupervised nonlinear method robust to sparse noises. Our theoretical analysis shows that, with high probability, RKPCA can provide high recovery accuracy. The optimization of RKPCA involves nonconvex and indifferentiable problems. We propose two nonconvex optimization algorithms for RKPCA. They are alternating direction method of multipliers with backtracking line search and proximal linearized minimization with adaptive step size. Comparative studies in noise removal and robust subspace clustering corroborate the effectiveness and superiority of RKPCA.
△ Less
Submitted 17 April, 2019; v1 submitted 28 February, 2018;
originally announced February 2018.
-
Lonely runners in function fields
Authors:
Sam Chow,
Luka Rimanic
Abstract:
The lonely runner conjecture, now over fifty years old, concerns the following problem. On a unit length circular track, consider $m$ runners starting at the same time and place, each runner having a different constant speed. The conjecture asserts that each runner is lonely at some point in time, meaning distance at least $1/m$ from the others. We formulate a function field analogue, and give a p…
▽ More
The lonely runner conjecture, now over fifty years old, concerns the following problem. On a unit length circular track, consider $m$ runners starting at the same time and place, each runner having a different constant speed. The conjecture asserts that each runner is lonely at some point in time, meaning distance at least $1/m$ from the others. We formulate a function field analogue, and give a positive answer in some cases in the new setting.
△ Less
Submitted 26 December, 2018; v1 submitted 3 November, 2017;
originally announced November 2017.
-
Additive energy and the metric Poissonian property
Authors:
Thomas F. Bloom,
Sam Chow,
Ayla Gafni,
Aled Walker
Abstract:
Let $A$ be a set of natural numbers. Recent work has suggested a strong link between the additive energy of $A$ (the number of solutions to $a_1 + a_2 = a_3 + a_4$ with $a_i \in A$) and the metric Poissonian property, which is a fine-scale equidistribution property for dilates of $A$ modulo $1$. There appears to be reasonable evidence to speculate a sharp Khintchine-type threshold, that is, to spe…
▽ More
Let $A$ be a set of natural numbers. Recent work has suggested a strong link between the additive energy of $A$ (the number of solutions to $a_1 + a_2 = a_3 + a_4$ with $a_i \in A$) and the metric Poissonian property, which is a fine-scale equidistribution property for dilates of $A$ modulo $1$. There appears to be reasonable evidence to speculate a sharp Khintchine-type threshold, that is, to speculate that the metric Poissonian property should be completely determined by whether or not a certain sum of additive energies is convergent or divergent. In this article, we primarily address the convergence theory, in other words the extent to which having a low additive energy forces a set to be metric Poissonian.
△ Less
Submitted 23 February, 2018; v1 submitted 8 September, 2017;
originally announced September 2017.
-
A discrete Schrodinger equation via optimal transport on graphs
Authors:
Shui-Nee Chow,
Wuchen Li,
Haomin Zhou
Abstract:
In 1966, Edward Nelson presented an interesting derivation of the Schrodinger equation using Brownian motion. Recently, this derivation is linked to the theory of optimal transport, which shows that the Schrodinger equation is a Hamiltonian system on the probability density manifold equipped with the Wasserstein metric. In this paper, we consider similar matters on a finite graph. By using discret…
▽ More
In 1966, Edward Nelson presented an interesting derivation of the Schrodinger equation using Brownian motion. Recently, this derivation is linked to the theory of optimal transport, which shows that the Schrodinger equation is a Hamiltonian system on the probability density manifold equipped with the Wasserstein metric. In this paper, we consider similar matters on a finite graph. By using discrete optimal transport and its corresponding Nelson's approach, we derive a discrete Schrodinger equation on a finite graph. The proposed system is quite different from the commonly referred discretized Schrodinger equations. It is a system of nonlinear ordinary differential equations (ODEs) with many desirable properties. Several numerical examples are presented to illustrate the properties.
△ Less
Submitted 25 October, 2017; v1 submitted 22 May, 2017;
originally announced May 2017.
-
Population games and Discrete optimal transport
Authors:
Shui-Nee Chow,
Wuchen Li,
Jun Lu,
Haomin Zhou
Abstract:
We propose a new evolutionary dynamics for population games with a discrete strategy set, inspired by the theory of optimal transport and Mean field games. The dynamics can be described as a Fokker-Planck equation on a discrete strategy set. The derived dynamics is the gradient flow of a free energy and the transition density equation of a Markov process. Such process provides models for the behav…
▽ More
We propose a new evolutionary dynamics for population games with a discrete strategy set, inspired by the theory of optimal transport and Mean field games. The dynamics can be described as a Fokker-Planck equation on a discrete strategy set. The derived dynamics is the gradient flow of a free energy and the transition density equation of a Markov process. Such process provides models for the behavior of the individual players in population, which is myopic, greedy and irrational. The stability of the dynamics is governed by optimal transport metric, entropy and Fisher information.
△ Less
Submitted 3 April, 2017;
originally announced April 2017.