-
Large coordinate kernel attention network for lightweight image super-resolution
Authors:
Fangwei Hao,
Jiesheng Wu,
Haotian Lu,
Ji Du,
**g Xu
Abstract:
The multi-scale receptive field and large kernel attention (LKA) module have been shown to significantly improve performance in the lightweight image super-resolution task. However, existing lightweight super-resolution (SR) methods seldom pay attention to designing efficient building block with multi-scale receptive field for local modeling, and their LKA modules face a quadratic increase in comp…
▽ More
The multi-scale receptive field and large kernel attention (LKA) module have been shown to significantly improve performance in the lightweight image super-resolution task. However, existing lightweight super-resolution (SR) methods seldom pay attention to designing efficient building block with multi-scale receptive field for local modeling, and their LKA modules face a quadratic increase in computational and memory footprints as the convolutional kernel size increases. To address the first issue, we propose the multi-scale blueprint separable convolutions (MBSConv) as highly efficient building block with multi-scale receptive field, it can focus on the learning for the multi-scale information which is a vital component of discriminative representation. As for the second issue, we revisit the key properties of LKA in which we find that the adjacent direct interaction of local information and long-distance dependencies is crucial to provide remarkable performance. Thus, taking this into account and in order to mitigate the complexity of LKA, we propose a large coordinate kernel attention (LCKA) module which decomposes the 2D convolutional kernels of the depth-wise convolutional layers in LKA into horizontal and vertical 1-D kernels. LCKA enables the adjacent direct interaction of local information and long-distance dependencies not only in the horizontal direction but also in the vertical. Besides, LCKA allows for the direct use of extremely large kernels in the depth-wise convolutional layers to capture more contextual information, which helps to significantly improve the reconstruction performance, and it incurs lower computational complexity and memory footprints. Integrating MBSConv and LCKA, we propose a large coordinate kernel attention network (LCAN).
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
XPose: eXplainable Human Pose Estimation
Authors:
Luyu Qiu,
Jianing Li,
Lei Wen,
Chi Su,
Fei Hao,
Chen Jason Zhang,
Lei Chen
Abstract:
Current approaches in pose estimation primarily concentrate on enhancing model architectures, often overlooking the importance of comprehensively understanding the rationale behind model decisions. In this paper, we propose XPose, a novel framework that incorporates Explainable AI (XAI) principles into pose estimation. This integration aims to elucidate the individual contribution of each keypoint…
▽ More
Current approaches in pose estimation primarily concentrate on enhancing model architectures, often overlooking the importance of comprehensively understanding the rationale behind model decisions. In this paper, we propose XPose, a novel framework that incorporates Explainable AI (XAI) principles into pose estimation. This integration aims to elucidate the individual contribution of each keypoint to final prediction, thereby elevating the model's transparency and interpretability. Conventional XAI techniques have predominantly addressed tasks with single-target tasks like classification. Additionally, the application of Shapley value, a common measure in XAI, to pose estimation has been hindered by prohibitive computational demands.
To address these challenges, this work introduces an innovative concept called Group Shapley Value (GSV). This approach strategically organizes keypoints into clusters based on their interdependencies. Within these clusters, GSV meticulously calculates Shapley value for keypoints, while for inter-cluster keypoints, it opts for a more holistic group-level valuation. This dual-level computation framework meticulously assesses keypoint contributions to the final outcome, optimizing computational efficiency. Building on the insights into keypoint interactions, we devise a novel data augmentation technique known as Group-based Keypoint Removal (GKR). This method ingeniously removes individual keypoints during training phases, deliberately preserving those with strong mutual connections, thereby refining the model's predictive prowess for non-visible keypoints. The empirical validation of GKR across a spectrum of standard approaches attests to its efficacy. GKR's success demonstrates how using Explainable AI (XAI) can directly enhance pose estimation models.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
BoostER: Leveraging Large Language Models for Enhancing Entity Resolution
Authors:
Huahang Li,
Shuangyin Li,
Fei Hao,
Chen Jason Zhang,
Yuanfeng Song,
Lei Chen
Abstract:
Entity resolution, which involves identifying and merging records that refer to the same real-world entity, is a crucial task in areas like Web data integration. This importance is underscored by the presence of numerous duplicated and multi-version data resources on the Web. However, achieving high-quality entity resolution typically demands significant effort. The advent of Large Language Models…
▽ More
Entity resolution, which involves identifying and merging records that refer to the same real-world entity, is a crucial task in areas like Web data integration. This importance is underscored by the presence of numerous duplicated and multi-version data resources on the Web. However, achieving high-quality entity resolution typically demands significant effort. The advent of Large Language Models (LLMs) like GPT-4 has demonstrated advanced linguistic capabilities, which can be a new paradigm for this task. In this paper, we propose a demonstration system named BoostER that examines the possibility of leveraging LLMs in the entity resolution process, revealing advantages in both easy deployment and low cost. Our approach optimally selects a set of matching questions and poses them to LLMs for verification, then refines the distribution of entity resolution results with the response of LLMs. This offers promising prospects to achieve a high-quality entity resolution result for real-world applications, especially to individuals or small companies without the need for extensive model training or significant financial investment.
△ Less
Submitted 11 March, 2024;
originally announced March 2024.
-
Learning Discretized Bayesian Networks with GOMEA
Authors:
Damy M. F. Ha,
Tanja Alderliesten,
Peter A. N. Bosman
Abstract:
Bayesian networks model relationships between random variables under uncertainty and can be used to predict the likelihood of events and outcomes while incorporating observed evidence. From an eXplainable AI (XAI) perspective, such models are interesting as they tend to be compact. Moreover, captured relations can be directly inspected by domain experts. In practice, data is often real-valued. Unl…
▽ More
Bayesian networks model relationships between random variables under uncertainty and can be used to predict the likelihood of events and outcomes while incorporating observed evidence. From an eXplainable AI (XAI) perspective, such models are interesting as they tend to be compact. Moreover, captured relations can be directly inspected by domain experts. In practice, data is often real-valued. Unless assumptions of normality can be made, discretization is often required. The optimal discretization, however, depends on the relations modelled between the variables. This complicates learning Bayesian networks from data. For this reason, most literature focuses on learning conditional dependencies between sets of variables, called structure learning. In this work, we extend an existing state-of-the-art structure learning approach based on the Gene-pool Optimal Mixing Evolutionary Algorithm (GOMEA) to jointly learn variable discretizations. The proposed Discretized Bayesian Network GOMEA (DBN-GOMEA) obtains similar or better results than the current state-of-the-art when tasked to retrieve randomly generated ground-truth networks. Moreover, leveraging a key strength of evolutionary algorithms, we can straightforwardly perform DBN learning multi-objectively. We show how this enables incorporating expert knowledge in a uniquely insightful fashion, finding multiple DBNs that trade-off complexity, accuracy, and the difference with a pre-determined expert network.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
On Leveraging Large Language Models for Enhancing Entity Resolution
Authors:
Huahang Li,
Longyu Feng,
Shuangyin Li,
Fei Hao,
Chen Jason Zhang,
Yuanfeng Song,
Lei Chen
Abstract:
Entity resolution, the task of identifying and consolidating records that pertain to the same real-world entity, plays a pivotal role in various sectors such as e-commerce, healthcare, and law enforcement. The emergence of Large Language Models (LLMs) like GPT-4 has introduced a new dimension to this task, leveraging their advanced linguistic capabilities. This paper explores the potential of LLMs…
▽ More
Entity resolution, the task of identifying and consolidating records that pertain to the same real-world entity, plays a pivotal role in various sectors such as e-commerce, healthcare, and law enforcement. The emergence of Large Language Models (LLMs) like GPT-4 has introduced a new dimension to this task, leveraging their advanced linguistic capabilities. This paper explores the potential of LLMs in the entity resolution process, shedding light on both their advantages and the computational complexities associated with large-scale matching. We introduce strategies for the efficient utilization of LLMs, including the selection of an optimal set of matching questions, namely MQsSP, which is proved to be a NP-hard problem. Our approach optimally chooses the most effective matching questions while keep consumption limited to your budget . Additionally, we propose a method to adjust the distribution of possible partitions after receiving responses from LLMs, with the goal of reducing the uncertainty of entity resolution. We evaluate the effectiveness of our approach using entropy as a metric, and our experimental results demonstrate the efficiency and effectiveness of our proposed methods, offering promising prospects for real-world applications.
△ Less
Submitted 7 January, 2024;
originally announced January 2024.
-
Similarity-driven and Task-driven Models for Diversity of Opinion in Crowdsourcing Markets
Authors:
Chen Jason Zhang,
Yunrui Liu,
Pengcheng Zeng,
Ting Wu,
Lei Chen,
Pan Hui,
Fei Hao
Abstract:
The recent boom in crowdsourcing has opened up a new avenue for utilizing human intelligence in the realm of data analysis. This innovative approach provides a powerful means for connecting online workers to tasks that cannot effectively be done solely by machines or conducted by professional experts due to cost constraints. Within the field of social science, four elements are required to constru…
▽ More
The recent boom in crowdsourcing has opened up a new avenue for utilizing human intelligence in the realm of data analysis. This innovative approach provides a powerful means for connecting online workers to tasks that cannot effectively be done solely by machines or conducted by professional experts due to cost constraints. Within the field of social science, four elements are required to construct a sound crowd - Diversity of Opinion, Independence, Decentralization and Aggregation. However, while the other three components have already been investigated and implemented in existing crowdsourcing platforms, 'Diversity of Opinion' has not been functionally enabled yet. From a computational point of view, constructing a wise crowd necessitates quantitatively modeling and taking diversity into account. There are usually two paradigms in a crowdsourcing marketplace for worker selection: building a crowd to wait for tasks to come and selecting workers for a given task. We propose similarity-driven and task-driven models for both paradigms. Also, we develop efficient and effective algorithms for recruiting a limited number of workers with optimal diversity in both models. To validate our solutions, we conduct extensive experiments using both synthetic datasets and real data sets.
△ Less
Submitted 28 February, 2024; v1 submitted 25 October, 2023;
originally announced October 2023.
-
Nowhere vanishing holomorphic one-forms and fibrations over abelian varieties
Authors:
Nathan Chen,
Benjamin Church,
Feng Hao
Abstract:
A result of Popa and Schnell shows that any holomorphic 1-form on a smooth complex projective variety of general type admits zeros. More generally, given a variety $X$ which admits $g$ pointwise linearly independent holomorphic 1-forms, their result shows that $X$ has Kodaira dimension $κ(X) \leq \dim X - g$. In the extremal case where $κ(X) = \dim X - g$ and $X$ is minimal, we prove that $X$ admi…
▽ More
A result of Popa and Schnell shows that any holomorphic 1-form on a smooth complex projective variety of general type admits zeros. More generally, given a variety $X$ which admits $g$ pointwise linearly independent holomorphic 1-forms, their result shows that $X$ has Kodaira dimension $κ(X) \leq \dim X - g$. In the extremal case where $κ(X) = \dim X - g$ and $X$ is minimal, we prove that $X$ admits a smooth morphism to an abelian variety, and classify all such $X$ by showing they arise as diagonal quotients of the product of an abelian variety with a variety of general type. The case $g = 1$ was first proved by the third author, and classification results about surfaces and threefolds carrying nowhere vanishing forms have appeared in work of Schreieder and subsequent joint work with the third author. We also prove a birational version of this classification which holds without the minimal assumption, and establish additional cases of a conjecture of the third author.
△ Less
Submitted 28 August, 2023; v1 submitted 26 June, 2023;
originally announced June 2023.
-
Spoofing Against Spoofing: Towards Caller ID Verification In Heterogeneous Telecommunication Systems
Authors:
Shen Wang,
Mahshid Delavar,
Muhammad Ajmal Azad,
Farshad Nabizadeh,
Steve Smith,
Feng Hao
Abstract:
Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling u…
▽ More
Caller ID spoofing is a global industry problem and often acts as a critical enabler for telephone fraud. To address this problem, the Federal Communications Commission (FCC) has mandated telecom providers in the US to implement STIR/SHAKEN, an industry-driven solution based on digital signatures. STIR/SHAKEN relies on a public key infrastructure (PKI) to manage digital certificates, but scaling up this PKI for the global telecom industry is extremely difficult, if not impossible. Furthermore, it only works with IP-based systems (e.g., SIP), leaving the traditional non-IP systems (e.g., SS7) unprotected. So far the alternatives to the STIR/SHAKEN have not been sufficiently studied. In this paper, we propose a PKI-free solution, called Caller ID Verification (CIV). CIV authenticates the caller ID based on a challenge-response process instead of digital signatures, hence requiring no PKI. It supports both IP and non-IP systems. Perhaps counter-intuitively, we show that number spoofing can be leveraged, in conjunction with Dual-Tone Multi-Frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We implement CIV for VoIP, cellular, and landline phones across heterogeneous networks (SS7/SIP) by only updating the software on the user's phone. This is the first caller ID authentication solution with working prototypes for all three types of telephone systems in the current telecom architecture. Finally, we show how the implementation of CIV can be optimized by integrating it into telecom clouds as a service, which users may subscribe to.
△ Less
Submitted 24 September, 2023; v1 submitted 9 June, 2023;
originally announced June 2023.
-
Human-imperceptible, Machine-recognizable Images
Authors:
Fusheng Hao,
Fengxiang He,
Yikai Wang,
Fuxiang Wu,
**g Zhang,
Jun Cheng,
Dacheng Tao
Abstract:
Massive human-related data is collected to train neural networks for computer vision tasks. A major conflict is exposed relating to software engineers between better develo** AI systems and distancing from the sensitive training data. To reconcile this conflict, this paper proposes an efficient privacy-preserving learning paradigm, where images are first encrypted to become ``human-imperceptible…
▽ More
Massive human-related data is collected to train neural networks for computer vision tasks. A major conflict is exposed relating to software engineers between better develo** AI systems and distancing from the sensitive training data. To reconcile this conflict, this paper proposes an efficient privacy-preserving learning paradigm, where images are first encrypted to become ``human-imperceptible, machine-recognizable'' via one of the two encryption strategies: (1) random shuffling to a set of equally-sized patches and (2) mixing-up sub-patches of the images. Then, minimal adaptations are made to vision transformer to enable it to learn on the encrypted images for vision tasks, including image classification and object detection. Extensive experiments on ImageNet and COCO show that the proposed paradigm achieves comparable accuracy with the competitive methods. Decrypting the encrypted images requires solving an NP-hard jigsaw puzzle or an ill-posed inverse problem, which is empirically shown intractable to be recovered by various attackers, including the powerful vision transformer-based attacker. We thus show that the proposed paradigm can ensure the encrypted images have become human-imperceptible while preserving machine-recognizable information. The code is available at \url{https://github.com/FushengHao/PrivacyPreservingML.}
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
Spying on the Spy: Security Analysis of Hidden Cameras
Authors:
Samuel Herodotou,
Feng Hao
Abstract:
Hidden cameras, also called spy cameras, are surveillance tools commonly used to spy on people without their knowledge. Whilst previous studies largely focused on investigating the detection of such a camera and the privacy implications, the security of the camera itself has received limited attention. Compared with ordinary IP cameras, spy cameras are normally sold in bulk at cheap prices and are…
▽ More
Hidden cameras, also called spy cameras, are surveillance tools commonly used to spy on people without their knowledge. Whilst previous studies largely focused on investigating the detection of such a camera and the privacy implications, the security of the camera itself has received limited attention. Compared with ordinary IP cameras, spy cameras are normally sold in bulk at cheap prices and are ubiquitously deployed in hidden places within homes and workplaces. A security compromise of these cameras can have severe consequences. In this paper, we analyse a generic IP camera module, which has been packaged and re-branded for sale by several spy camera vendors. The module is controlled by mobile phone apps. By analysing the Android app and the traffic data, we reverse-engineered the security design of the whole system, including the module's Linux OS environment, the file structure, the authentication mechanism, the session management, and the communication with a remote server. Serious vulnerabilities have been identified in every component. Combined together, they allow an adversary to take complete control of a spy camera from anywhere over the Internet, enabling arbitrary code execution. This is possible even if the camera is behind a firewall. All that an adversary needs to launch an attack is the camera's serial number, which users sometimes unknowingly share in online reviews. We responsibly disclosed our findings to the manufacturer. Whilst the manufacturer acknowledged our work, they showed no intention to fix the problems. Patching or recalling the affected cameras is infeasible due to complexities in the supply chain. However, it is prudent to assume that bad actors have already been exploiting these flaws. We provide details of the identified vulnerabilities in order to raise public awareness, especially on the grave danger of disclosing a spy camera's serial number.
△ Less
Submitted 1 June, 2023;
originally announced June 2023.
-
A monitoring campaign (2013-2020) of ESA's Mars Express to study interplanetary plasma scintillation
Authors:
P. Kummamuru,
G. Molera Calvés,
G. Cimò,
S. V. Pogrebenko,
T. M. Bocanegra-Bahamón,
D. A. Duev,
M. D. Md Said,
J. Edwards,
M. Ma,
J. Quick,
A. Neidhardt,
P. de Vicente,
R. Haas,
J. Kallunki,
1 G. Maccaferri,
G. Colucci,
W. J. Yang,
L. F. Hao,
S. Weston,
M. A. Kharinov,
A. G. Mikhailov,
T. Jung
Abstract:
The radio signal transmitted by the Mars Express (MEX) spacecraft was observed regularly between the years 2013-2020 at X-band (8.42 GHz) using the European Very Long Baseline Interferometry (EVN) network and University of Tasmania's telescopes. We present a method to describe the solar wind parameters by quantifying the effects of plasma on our radio signal. In doing so, we identify all the uncom…
▽ More
The radio signal transmitted by the Mars Express (MEX) spacecraft was observed regularly between the years 2013-2020 at X-band (8.42 GHz) using the European Very Long Baseline Interferometry (EVN) network and University of Tasmania's telescopes. We present a method to describe the solar wind parameters by quantifying the effects of plasma on our radio signal. In doing so, we identify all the uncompensated effects on the radio signal and see which coronal processes drive them. From a technical standpoint, quantifying the effect of the plasma on the radio signal helps phase referencing for precision spacecraft tracking. The phase fluctuation of the signal was determined for Mars' orbit for solar elongation angles from 0 - 180 deg. The calculated phase residuals allow determination of the phase power spectrum. The total electron content (TEC) of the solar plasma along the line of sight is calculated by removing effects from mechanical and ionospheric noises. The spectral index was determined as $-2.43 \pm 0.11$ which is in agreement with Kolomogorov's turbulence. The theoretical models are consistent with observations at lower solar elongations however at higher solar elongation ($>$160 deg) we see the observed values to be higher. This can be caused when the uplink and downlink signals are positively correlated as a result of passing through identical plasma sheets.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
Nowhere vanishing holomorphic one-forms on varieties of Kodaira codimension one
Authors:
Feng Hao
Abstract:
Based on the celebrated result on zeros of holomorphic 1-forms on complex varieties of general type by Popa and Schnell, we study holomorphic 1-forms on $n$-dimensional varieties of Kodaira dimension $n-1$. We show that a complex minimal smooth projective variety $X$ of Kodaira dimension $κ(X)=\dim X-1$ admits a holomorphic 1-form without zero if and only if there is a smooth morphism from $X$ to…
▽ More
Based on the celebrated result on zeros of holomorphic 1-forms on complex varieties of general type by Popa and Schnell, we study holomorphic 1-forms on $n$-dimensional varieties of Kodaira dimension $n-1$. We show that a complex minimal smooth projective variety $X$ of Kodaira dimension $κ(X)=\dim X-1$ admits a holomorphic 1-form without zero if and only if there is a smooth morphism from $X$ to an elliptic curve. Furthermore, for a general smooth projective variety (not necessarily minimal) $X$ of Kodaira codimension one, we give a structure theorem for $X$ given that $X$ admits a holomorphic 1-form without zero.
△ Less
Submitted 15 November, 2022;
originally announced November 2022.
-
A fast radio burst source at a complex magnetised site in a barred galaxy
Authors:
H. Xu,
J. R. Niu,
P. Chen,
K. J. Lee,
W. W. Zhu,
S. Dong,
B. Zhang,
J. C. Jiang,
B. J. Wang,
J. W. Xu,
C. F. Zhang,
H. Fu,
A. V. Filippenko,
E. W. Peng,
D. J. Zhou,
Y. K. Zhang,
P. Wang,
Y. Feng,
Y. Li,
T. G. Brink,
D. Z. Li,
W. Lu,
Y. P. Yang,
R. N. Caballero,
C. Cai
, et al. (49 additional authors not shown)
Abstract:
Fast radio bursts (FRBs) are highly dispersed millisecond-duration radio bursts. Recent observations of a Galactic FRB suggest that at least some FRBs originate from magnetars, but the origin of cosmological FRBs is still not settled. Here we report the detection of 1863 bursts in 82 hr over 54 days from the repeating source FRB~20201124A. These observations show irregular short-time variation of…
▽ More
Fast radio bursts (FRBs) are highly dispersed millisecond-duration radio bursts. Recent observations of a Galactic FRB suggest that at least some FRBs originate from magnetars, but the origin of cosmological FRBs is still not settled. Here we report the detection of 1863 bursts in 82 hr over 54 days from the repeating source FRB~20201124A. These observations show irregular short-time variation of the Faraday rotation measure (RM), which probes the density-weighted line-of-sight magnetic field strength, of individual bursts during the first 36 days, followed by a constant RM. We detected circular polarisation in more than half of the burst sample, including one burst reaching a high fractional circular polarisation of 75%. Oscillations in fractional linear and circular polarisations as well as polarisation angle as a function of wavelength were detected. All of these features provide evidence for a complicated, dynamically evolving, magnetised immediate environment within about an astronomical unit (au; Earth-Sun distance) of the source. Our optical observations of its Milky-Way-sized, metal-rich host galaxy reveal a barred spiral, with the FRB source residing in a low stellar density, interarm region at an intermediate galactocentric distance. This environment is inconsistent with a young magnetar engine formed during an extreme explosion of a massive star that resulted in a long gamma-ray burst or superluminous supernova.
△ Less
Submitted 13 September, 2022; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Can You See Me Now? A Measurement Study of Zoom, Webex, and Meet
Authors:
Hyunseok Chang,
Matteo Varvello,
Fang Hao,
Sarit Mukherjee
Abstract:
Since the outbreak of the COVID-19 pandemic, videoconferencing has become the default mode of communication in our daily lives at homes, workplaces and schools, and it is likely to remain an important part of our lives in the post-pandemic world. Despite its significance, there has not been any systematic study characterizing the user-perceived performance of existing videoconferencing systems oth…
▽ More
Since the outbreak of the COVID-19 pandemic, videoconferencing has become the default mode of communication in our daily lives at homes, workplaces and schools, and it is likely to remain an important part of our lives in the post-pandemic world. Despite its significance, there has not been any systematic study characterizing the user-perceived performance of existing videoconferencing systems other than anecdotal reports. In this paper, we present a detailed measurement study that compares three major videoconferencing systems: Zoom, Webex and Google Meet. Our study is based on 48 hours' worth of more than 700 videoconferencing sessions, which were created with a mix of emulated videoconferencing clients deployed in the cloud, as well as real mobile devices running from a residential network. We find that the existing videoconferencing systems vary in terms of geographic scope, which in turns determines streaming lag experienced by users. We also observe that streaming rate can change under different conditions (e.g., number of users in a session, mobile device status, etc), which affects user-perceived streaming quality. Beyond these findings, our measurement methodology can enable reproducible benchmark analysis for any types of comparative or longitudinal study on available videoconferencing systems.
△ Less
Submitted 27 September, 2021;
originally announced September 2021.
-
HMSG: Heterogeneous Graph Neural Network based on Metapath Subgraph Learning
Authors:
Xinjun Cai,
Jiaxing Shang,
Fei Hao,
Dajiang Liu,
Linjiang Zheng
Abstract:
Many real-world data can be represented as heterogeneous graphs with different types of nodes and connections. Heterogeneous graph neural network model aims to embed nodes or subgraphs into low-dimensional vector space for various downstream tasks such as node classification, link prediction, etc. Although several models were proposed recently, they either only aggregate information from the same…
▽ More
Many real-world data can be represented as heterogeneous graphs with different types of nodes and connections. Heterogeneous graph neural network model aims to embed nodes or subgraphs into low-dimensional vector space for various downstream tasks such as node classification, link prediction, etc. Although several models were proposed recently, they either only aggregate information from the same type of neighbors, or just indiscriminately treat homogeneous and heterogeneous neighbors in the same way. Based on these observations, we propose a new heterogeneous graph neural network model named HMSG to comprehensively capture structural, semantic and attribute information from both homogeneous and heterogeneous neighbors. Specifically, we first decompose the heterogeneous graph into multiple metapath-based homogeneous and heterogeneous subgraphs, and each subgraph associates specific semantic and structural information. Then message aggregation methods are applied to each subgraph independently, so that information can be learned in a more targeted and efficient manner. Through a type-specific attribute transformation, node attributes can also be transferred among different types of nodes. Finally, we fuse information from subgraphs together to get the complete representation. Extensive experiments on several datasets for node classification, node clustering and link prediction tasks show that HMSG achieves the best performance in all evaluation metrics than state-of-the-art baselines.
△ Less
Submitted 7 September, 2021;
originally announced September 2021.
-
Generic Vanishing, 1-forms, and Topology of Albanese Maps
Authors:
Yajnaseni Dutta,
Feng Hao,
Yongqiang Liu
Abstract:
Given a bounded constructible complex of sheaves $\mathcal{F}$ on a complex Abelian variety, we prove an equality relating the cohomology jump loci of $\mathcal{F}$ and its singular support. As an application, we identify two subsets of the set of holomorphic 1-forms with zeros on a complex smooth projective irregular variety $X$; one from Green-Lazarsfeld's cohomology jump loci and one from the K…
▽ More
Given a bounded constructible complex of sheaves $\mathcal{F}$ on a complex Abelian variety, we prove an equality relating the cohomology jump loci of $\mathcal{F}$ and its singular support. As an application, we identify two subsets of the set of holomorphic 1-forms with zeros on a complex smooth projective irregular variety $X$; one from Green-Lazarsfeld's cohomology jump loci and one from the Kashiwara's estimates for singular supports. This result is related to Kotschick's conjecture about the equivalence between the existence of nowhere vanishing global holomorphic 1-forms and the existence of a fibre bundle structure over the circle. Our results give a conjecturally equivalent formulation using singular support, which is equivalent to a criterion involving cohomology jump loci proposed by Schreieder. As another application, we reprove a recent result proved by Schreieder and Yang; namely if $X$ has simple Albanese variety and admits a fibre bundle structure over the circle, then the Albanese morphism cohomologically behaves like a smooth morphism with respect to integer coefficients.
In a related direction, we address the question whether the set of 1-forms that vanish somewhere is a finite union of linear subspaces of $H^0(X,Ω_X^1)$. We show that this is indeed the case for forms admitting zero locus of codimension 1.
△ Less
Submitted 4 January, 2024; v1 submitted 14 April, 2021;
originally announced April 2021.
-
$π_1$-small divisors and fundamental groups of varieties
Authors:
Feng Hao
Abstract:
Lasell and Ramachandran show that the existence of rational curves of positive self-intersection on a smooth projective surface $X$ implies that all the finite dimensional linear representations of the fundamental group $π_1(X)$ are finite. In this article, we generalize Lasell and Ramachandran's result to the case of $π_1$-small divisors on quasiprojective varieties. We also study $π_1$-small cur…
▽ More
Lasell and Ramachandran show that the existence of rational curves of positive self-intersection on a smooth projective surface $X$ implies that all the finite dimensional linear representations of the fundamental group $π_1(X)$ are finite. In this article, we generalize Lasell and Ramachandran's result to the case of $π_1$-small divisors on quasiprojective varieties. We also study $π_1$-small curves and hyperbolicity properties of smooth projective surfaces of general type with infinite fundamental groups.
△ Less
Submitted 4 April, 2021;
originally announced April 2021.
-
Fast radio burst detection in the presence of coloured noise
Authors:
C. F. Zhang,
J. W. Xu,
Y. P. Men,
X. H. Deng,
Heng Xu,
J. C. Jiang,
B. J. Wang,
K. J. Lee,
J. Li,
J. P. Yuan,
Z. Y. Liu,
Y. X. Huang,
Y. H. Xu,
Z. X. Li,
L. F. Hao,
J. T. Luo,
S. Dai,
R. Luo,
Hassan Zakie,
Z. Y. Ma
Abstract:
In this paper, we investigate the impact of correlated noise on fast radio burst (FRB) searching. We found that 1) the correlated noise significantly increases the false alarm probability; 2) the signal-to-noise ratios (S/N) of the false positives become higher; 3) the correlated noise also affects the pulse width distribution of false positives, and there will be more false positives with wider p…
▽ More
In this paper, we investigate the impact of correlated noise on fast radio burst (FRB) searching. We found that 1) the correlated noise significantly increases the false alarm probability; 2) the signal-to-noise ratios (S/N) of the false positives become higher; 3) the correlated noise also affects the pulse width distribution of false positives, and there will be more false positives with wider pulse width. We use 55-hour observation for M82 galaxy carried out at Nanshan 26m radio telescope to demonstrate the application of the correlated noise modelling. The number of candidates and parameter distribution of the false positives can be reproduced with the modelling of correlated noise. We will also discuss a low S/N candidate detected in the observation, for which we demonstrate the method to evaluate the false alarm probability in the presence of correlated noise.Possible origins of the candidate are discussed, where two possible pictures, an M82-harbored giant pulse and a cosmological FRB, are both compatible with the observation.
△ Less
Submitted 18 March, 2021;
originally announced March 2021.
-
Formal Modelling and Security Analysis of Bitcoin's Payment Protocol
Authors:
Paolo Modesti,
Siamak F. Shahandashti,
Patrick McCorry,
Feng Hao
Abstract:
The Payment Protocol standard BIP70, specifying how payments in Bitcoin are performed by merchants and customers, is supported by the largest payment processors and most widely-used wallets. The protocol has been shown to be vulnerable to refund attacks due to lack of authentication of the refund addresses. In this paper, we give the first formal model of the protocol and formalise the refund addr…
▽ More
The Payment Protocol standard BIP70, specifying how payments in Bitcoin are performed by merchants and customers, is supported by the largest payment processors and most widely-used wallets. The protocol has been shown to be vulnerable to refund attacks due to lack of authentication of the refund addresses. In this paper, we give the first formal model of the protocol and formalise the refund address security goals for the protocol, namely refund address authentication and secrecy. The formal model utilises communication channels as abstractions conveying security goals on which the protocol modeller and verifier can rely. We analyse the Payment Protocol confirming that it is vulnerable to an attack violating the refund address authentication security goal. Moreover, we present a concrete protocol revision proposal supporting the merchant with publicly verifiable evidence that can mitigate the attack. We verify that the revised protocol meets the security goals defined for the refund address. Hence, we demonstrate that the revised protocol is secure, not only against the existing attacks, but also against any further attacks violating the formalised security goals.
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
Anti-Counterfeiting for Polymer Banknotes Based on Polymer Substrate Fingerprinting
Authors:
Shen Wang,
Ehsan Toreini,
Feng Hao
Abstract:
Polymer banknotes are the trend for printed currency and have been adopted by more than fifty countries worldwide. However, over the past years, the quantity of polymer counterfeits has been increasing, so has the quality of counterfeits. This shows that the initial advantage of bringing a new polymer technology to fight against counterfeiting is reducing. To maintain one step ahead of counterfeit…
▽ More
Polymer banknotes are the trend for printed currency and have been adopted by more than fifty countries worldwide. However, over the past years, the quantity of polymer counterfeits has been increasing, so has the quality of counterfeits. This shows that the initial advantage of bringing a new polymer technology to fight against counterfeiting is reducing. To maintain one step ahead of counterfeiters, we propose a novel anti-counterfeiting technique called Polymer Substrate Fingerprinting (PSF). Our technique is built based on the observation that the opacity coating, a critical step during the production of polymer notes, is a stochastic manufacturing process, leaving uneven thickness in the coating layer and the random dispersion of impurities from the ink. The imperfections in the coating layer result in random translucent patterns when a polymer banknote is back-lit by a light source. We show these patterns can be reliably captured by a commodity negative-film scanner and processed into a compact fingerprint to uniquely identify each banknote. Using an extensive dataset of 6,200 sample images collected from 340 UK banknotes, we show that our method can reliably authenticate banknotes, and is robust against rough daily handling of banknotes. Furthermore, we show the extracted fingerprints contain around 900 bits of entropy, which makes it extremely scalable to identify every polymer note circulated globally. As compared with previous or existing anti-counterfeiting mechanisms for banknotes, our method has a distinctive advantage: it ensures that even in the extreme case when counterfeiters have procured the same printing equipment and ink as used by a legitimate government, counterfeiting banknotes remains infeasible because of the difficulty to replicate a stochastic manufacturing process.
△ Less
Submitted 23 March, 2021; v1 submitted 10 March, 2021;
originally announced March 2021.
-
Diverse polarization angle swings from a repeating fast radio burst source
Authors:
R. Luo,
B. J. Wang,
Y. P. Men,
C. F. Zhang,
J. C. Jiang,
H. Xu,
W. Y. Wang,
K. J. Lee,
J. L. Han,
B. Zhang,
R. N. Caballero,
M. Z. Chen,
X. L. Chen,
H. Q. Gan,
Y. J. Guo,
L. F. Hao,
Y. X. Huang,
P. Jiang,
H. Li,
J. Li,
Z. X. Li,
J. T. Luo,
J. Pan,
X. Pei,
L. Qian
, et al. (12 additional authors not shown)
Abstract:
Fast radio bursts (FRBs) are millisecond-duration radio transients of unknown origin. Two possible mechanisms that could generate extremely coherent emission from FRBs invoke neutron star magnetospheres or relativistic shocks far from the central energy source. Detailed polarization observations may help us to understand the emission mechanism. However, the available FRB polarization data have bee…
▽ More
Fast radio bursts (FRBs) are millisecond-duration radio transients of unknown origin. Two possible mechanisms that could generate extremely coherent emission from FRBs invoke neutron star magnetospheres or relativistic shocks far from the central energy source. Detailed polarization observations may help us to understand the emission mechanism. However, the available FRB polarization data have been perplexing, because they show a host of polarimetric properties, including either a constant polarization angle during each burst for some repeaters or variable polarization angles in some other apparently one-off events. Here we report observations of 15 bursts from FRB 180301 and find various polarization angle swings in seven of them. The diversity of the polarization angle features of these bursts is consistent with a magnetospheric origin of the radio emission, and disfavours the radiation models invoking relativistic shocks.
△ Less
Submitted 30 October, 2020;
originally announced November 2020.
-
Giant micropulse emission in the Vela pulsar at C band
Authors:
J. L. Chen,
Z. G. Wen,
L. F. Hao,
J. P. Yuan,
J. Li,
H. G. Wang,
W. M. Yan,
K. J. Lee,
N. Wang,
Y. H. Xu,
Z. X. Li,
Y. X. Huang,
R. Yuen,
M. Mijit
Abstract:
We present here the analysis of giant micropulses from the Vela pulsar. A total of 4187 giant micropulses with peak flux density $>$2.5 Jy were detected during almost 4 hours of observations carried out with the Yunnan 40-m radio telescope at 6800 MHz. Nine of the giant micropulses arrived approximately 3 to 4 ms earlier than the peak of average pulse profile, longer than that at lower frequencies…
▽ More
We present here the analysis of giant micropulses from the Vela pulsar. A total of 4187 giant micropulses with peak flux density $>$2.5 Jy were detected during almost 4 hours of observations carried out with the Yunnan 40-m radio telescope at 6800 MHz. Nine of the giant micropulses arrived approximately 3 to 4 ms earlier than the peak of average pulse profile, longer than that at lower frequencies. The remaining giant micropulses were clustered into three distributions which correspond to three main emission regions, including four occurring on the trailing edge of averaged profile.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
MSA-MIL: A deep residual multiple instance learning model based on multi-scale annotation for classification and visualization of glomerular spikes
Authors:
Yilin Chen,
Ming Li,
Yongfei Wu,
Xueyu Liu,
Fang Hao,
Daoxiang Zhou,
Xiaoshuang Zhou,
Chen Wang
Abstract:
Membranous nephropathy (MN) is a frequent type of adult nephrotic syndrome, which has a high clinical incidence and can cause various complications. In the biopsy microscope slide of membranous nephropathy, spikelike projections on the glomerular basement membrane is a prominent feature of the MN. However, due to the whole biopsy slide contains large number of glomeruli, and each glomerulus includ…
▽ More
Membranous nephropathy (MN) is a frequent type of adult nephrotic syndrome, which has a high clinical incidence and can cause various complications. In the biopsy microscope slide of membranous nephropathy, spikelike projections on the glomerular basement membrane is a prominent feature of the MN. However, due to the whole biopsy slide contains large number of glomeruli, and each glomerulus includes many spike lesions, the pathological feature of the spikes is not obvious. It thus is time-consuming for doctors to diagnose glomerulus one by one and is difficult for pathologists with less experience to diagnose. In this paper, we establish a visualized classification model based on the multi-scale annotation multi-instance learning (MSA-MIL) to achieve glomerular classification and spikes visualization. The MSA-MIL model mainly involves three parts. Firstly, U-Net is used to extract the region of the glomeruli to ensure that the features learned by the succeeding algorithm are focused inside the glomeruli itself. Secondly, we use MIL to train an instance-level classifier combined with MSA method to enhance the learning ability of the network by adding a location-level labeled reinforced dataset, thereby obtaining an example-level feature representation with rich semantics. Lastly, the predicted scores of each tile in the image are summarized to obtain glomerular classification and visualization of the classification results of the spikes via the usage of sliding window method. The experimental results confirm that the proposed MSA-MIL model can effectively and accurately classify normal glomeruli and spiked glomerulus and visualize the position of spikes in the glomerulus. Therefore, the proposed model can provide a good foundation for assisting the clinical doctors to diagnose the glomerular membranous nephropathy.
△ Less
Submitted 18 July, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
-
Discovery of delayed spin-up behavior following two large glitches in the Crab pulsar, and the statistics of such processes
Authors:
M. Y. Ge,
S. N. Zhang,
F. J. Lu,
T. P. Li,
J. P. Yuan,
X. P. Zheng,
Y. Huang,
S. J. Zheng,
Y. P. Chen,
Z. Chang,
Y. L. Tuo,
Q. Cheng,
C. Güngör,
L. M. Song,
Y. P. Xu,
X. L. Cao,
Y. Chen,
C. Z. Liu,
S. Zhang,
J. L. Qu,
Q. C. Bu,
C. Cai,
G. Chen,
L. Chen,
M. Z. Chen
, et al. (111 additional authors not shown)
Abstract:
Glitches correspond to sudden jumps of rotation frequency ($ν$) and its derivative ($\dotν$) of pulsars, the origin of which remains not well understood yet, partly because the jump processes of most glitches are not well time-resolved. There are three large glitches of the Crab pulsar, detected in 1989, 1996 and 2017, which were found to have delayed spin-up processes before the normal recovery p…
▽ More
Glitches correspond to sudden jumps of rotation frequency ($ν$) and its derivative ($\dotν$) of pulsars, the origin of which remains not well understood yet, partly because the jump processes of most glitches are not well time-resolved. There are three large glitches of the Crab pulsar, detected in 1989, 1996 and 2017, which were found to have delayed spin-up processes before the normal recovery processes. Here we report two additional glitches of the Crab pulsar occurred in 2004 and 2011 for which we discovered delayed spin up processes, and present refined parameters of the largest glitch occurred in 2017. The initial rising time of the glitch is determined as $<0.48$ hour. We also carried out a statistical study of these five glitches with observed spin-up processes. The two glitches occurred in 2004 and 2011 have delayed spin-up time scales ($τ_{1}$) of $1.7\pm0.8$\,days and $1.6\pm0.4$\,days, respectively. We find that the $Δν$ vs. $|Δ{\dotν}|$ relation of these five glitches is similar to those with no detected delayed spin-up process, indicating that they are similar to the others in nature except that they have larger amplitudes. For these five glitches, the amplitudes of the delayed spin-up process ($|Δν_{\rm d1}|$) and recovery process ($Δν_{\rm d2}$), their time scales ($τ_{1}$, $τ_{2}$), and permanent changes in spin frequency ($Δν_{\rm p}$) and total frequency step ($Δν_{\rm g}$) have positive correlations. From these correlations, we suggest that the delayed spin-up processes are common for all glitches, but are too short and thus difficult to be detected for most glitches.
△ Less
Submitted 1 April, 2020;
originally announced April 2020.
-
Equality in the Bogomolov--Miyaoka--Yau inequality in the non-general type case
Authors:
Feng Hao,
Stefan Schreieder
Abstract:
We classify all minimal models X of dimension n, Kodaira dimension n-1 and with vanishing Chern number $c_1^{n-2}c_2(X)=0$. This solves a problem of Kollár.
Completing previous work of Kollár and Grassi, we also show that there is a universal constant $ε>0$ such that any minimal threefold satisfies either $c_1c_2=0$ or $-c_1c_2>ε$. This settles completely a conjecture of Kollár.
We classify all minimal models X of dimension n, Kodaira dimension n-1 and with vanishing Chern number $c_1^{n-2}c_2(X)=0$. This solves a problem of Kollár.
Completing previous work of Kollár and Grassi, we also show that there is a universal constant $ε>0$ such that any minimal threefold satisfies either $c_1c_2=0$ or $-c_1c_2>ε$. This settles completely a conjecture of Kollár.
△ Less
Submitted 28 January, 2021; v1 submitted 31 March, 2020;
originally announced March 2020.
-
Flexo-diffusion effect: the strong influence on lithium diffusion induced by strain gradient
Authors:
Gao Xu,
Feng Hao,
Mouyi Weng,
Jiawang Hong,
Feng Pan,
Daining Fang
Abstract:
Lithium ion batteries (LIBs) work under sophisticated external force field and its electrochemical properties could be modulated by strain. Owing to the electro-mechanical coupling, the change of micro-local-structures can greatly affect lithium (Li) diffusion rate in solid state electrolytes and electrode materials of LIBs. In this study, we find that strain gradient in bilayer graphene (BLG) sig…
▽ More
Lithium ion batteries (LIBs) work under sophisticated external force field and its electrochemical properties could be modulated by strain. Owing to the electro-mechanical coupling, the change of micro-local-structures can greatly affect lithium (Li) diffusion rate in solid state electrolytes and electrode materials of LIBs. In this study, we find that strain gradient in bilayer graphene (BLG) significantly affects Li diffusion barrier, which is termed as the flexo-diffusion effect, through first-principles calculations. The Li diffusion barrier substantially decreases/increases under the positive/negative strain gradient, leading to the change of Li diffusion coefficient in several orders of magnitude at 300 K. Interestingly, the regulation effect of strain gradient is much more significant than that of uniform strain field, which can have a remarkable effect on the rate performance of batteries, with a considerable increase in the ionic conductivity and a slight change of the original material structure. Moreover, our ab initio molecular dynamics simulations (AIMD) show that the asymmetric distorted lattice structure provides a driving force for Li diffusion, resulting in oriented diffusion along the positive strain gradient direction. These findings could extend present LIBs technologies by introducing the novel strain gradient engineering.
△ Less
Submitted 13 February, 2020;
originally announced February 2020.
-
Strain gradient drives lithium dendrite growth from the atomic-scale simulations
Authors:
Gao Xu,
Feng Hao,
Jiawang Hong,
Daining Fang
Abstract:
Dendrite formation is a major obstacle, such as capacity loss and short circuit, to the next-generation high-energy-density lithium (Li) metal batteries. The development of successful Li dendrite mitigation strategies is impeded by an insufficient understanding of Li dendrite growth mechanisms. Li-plating-induced internal stress in Li metal and its effect on dendrite growth have been studied in pr…
▽ More
Dendrite formation is a major obstacle, such as capacity loss and short circuit, to the next-generation high-energy-density lithium (Li) metal batteries. The development of successful Li dendrite mitigation strategies is impeded by an insufficient understanding of Li dendrite growth mechanisms. Li-plating-induced internal stress in Li metal and its effect on dendrite growth have been studied in previous models and experiments, while the underlying microcosmic mechanism is elusive. Here, we analyze the role of plating-induced stress in dendrite formation through first-principles calculations and ab initio molecular dynamics simulations. We show that the deposited Li forms a stable atomic nanofilm structure on copper (Cu) substrate. It is found that the adsorption energy of Li atoms increases from the Li-Cu interface to deposited Li surface, leading to more aggregated Li atoms at the interface. Compared to the pristine Li metal, the deposited Li in the early stage becomes compacted and suffers in-plane compressive stress. Interestingly, we find that there is a giant strain gradient distribution from the Li-Cu interface to deposited Li surface, which makes the deposited atoms adjacent to the Cu surface tend to press upwards with perturbation, causing the dendrite growth. This understanding provides an insight to the atomic-scale origin of Li dendrite growth and may be useful for suppressing the Li dendrite in the Li-metal-based rechargeable batteries.
△ Less
Submitted 5 January, 2020;
originally announced January 2020.
-
Vanishing theorem for tame harmonic bundles via $L^2$-cohomology
Authors:
Ya Deng,
Feng Hao
Abstract:
Using $L^2$-methods, we prove a vanishing theorem for tame harmonic bundles over quasi-compact Kähler manifolds in a very general setting. As a special case, we give a completely new proof of the Kodaira type vanishing theorems for Higgs bundles due to Arapura. To prove our vanishing theorem, we construct a fine resolution of the Dolbeault complex for tame harmonic bundles via the complex of sheav…
▽ More
Using $L^2$-methods, we prove a vanishing theorem for tame harmonic bundles over quasi-compact Kähler manifolds in a very general setting. As a special case, we give a completely new proof of the Kodaira type vanishing theorems for Higgs bundles due to Arapura. To prove our vanishing theorem, we construct a fine resolution of the Dolbeault complex for tame harmonic bundles via the complex of sheaves of $L^2$-forms, and we establish the Hörmander $L^2$-estimate and solve $(\bar{\partial}_E+θ)$-equations for Higgs bundles $(E,θ)$.
△ Less
Submitted 23 April, 2022; v1 submitted 5 December, 2019;
originally announced December 2019.
-
Game Theoretical Approach to Sequential Hypothesis Test with Byzantine Sensors
Authors:
Zishuo Li,
Yilin Mo,
Fei Hao
Abstract:
In this paper, we consider the problem of sequential binary hypothesis test in adversary environment based on observations from s sensors, with the caveat that a subset of c sensors is compromised by an adversary, whose observations can be manipulated arbitrarily. We choose the asymptotic Average Sample Number (ASN) required to reach a certain level of error probability as the performance metric o…
▽ More
In this paper, we consider the problem of sequential binary hypothesis test in adversary environment based on observations from s sensors, with the caveat that a subset of c sensors is compromised by an adversary, whose observations can be manipulated arbitrarily. We choose the asymptotic Average Sample Number (ASN) required to reach a certain level of error probability as the performance metric of the system. The problem is cast as a game between the detector and the adversary, where the detector aims to optimize the system performance while the adversary tries to deteriorate it. We propose a pair of flip attack strategy and voting hypothesis testing rule and prove that they form an equilibrium strategy pair for the game. We further investigate the performance of our proposed detection scheme with unknown number of compromised sensors and corroborate our result with simulation.
△ Less
Submitted 6 September, 2019;
originally announced September 2019.
-
Piggyback search for fast radio bursts using Nanshan 26m and Kunming 40m radio telescopes -- I. Observing and data analysis systems, discovery of a mysterious peryton
Authors:
Y. P. Men,
R. Luo,
M. Z. Chen,
L. F. Hao,
K. J. Lee,
J. Li,
Z. X. Li,
Z. Y. Liu,
X. Pei,
Z. G. Wen,
J. J. Wu,
Y. H. Xu,
R. X. Xu,
J. P. Yuan,
C. F. Zhang
Abstract:
We present our piggyback search for fast radio bursts using the Nanshan 26m Radio Telescope and the Kunming 40m Radio Telescope. The observations are performed in the L-band from 1380 MHz to 1700 MHz at Nanshan and S-band from 2170 MHz to 2310 MHz at Kunming. We built the \textsc{Roach2}-based FFT spectrometer and developed the real-time transient search software. We introduce a new radio interfer…
▽ More
We present our piggyback search for fast radio bursts using the Nanshan 26m Radio Telescope and the Kunming 40m Radio Telescope. The observations are performed in the L-band from 1380 MHz to 1700 MHz at Nanshan and S-band from 2170 MHz to 2310 MHz at Kunming. We built the \textsc{Roach2}-based FFT spectrometer and developed the real-time transient search software. We introduce a new radio interference mitigation technique named \emph{zero-DM matched filter} and give the formula of the signal-to-noise ratio loss in the transient search. Though we have no positive detection of bursts in about 1600 and 2400 hours data at Nanshan and Kunming respectively, an intriguing peryton was detected at Nanshan, from which hundreds of bursts were recorded. Perytons are terrestrial radio signals that mimic celestial fast radio bursts. They were first reported at Parkes and identified as microwave oven interferences later. The bursts detected at Nanshan show similar frequency swept emission and have double-peaked profiles. They appeared in different sky regions in about tens of minutes observations and the dispersion measure index is not exactly 2, which indicates the terrestrial origin. The peryton differs drastically from the known perytons detected at Parkes, because it appeared in a precise period of $p=1.71287\pm 0.00004$ s. Its origin remains unknown.
△ Less
Submitted 30 July, 2019;
originally announced July 2019.
-
Holomorphic one-forms without zeros on threefolds
Authors:
Feng Hao,
Stefan Schreieder
Abstract:
We show that a smooth complex projective threefold admits a holomorphic one-form without zeros if and only if the underlying real 6-manifold fibres smoothly over the circle, and we give a complete classification of all threefolds with that property. Our results prove a conjecture of Kotschick in dimension three.
We show that a smooth complex projective threefold admits a holomorphic one-form without zeros if and only if the underlying real 6-manifold fibres smoothly over the circle, and we give a complete classification of all threefolds with that property. Our results prove a conjecture of Kotschick in dimension three.
△ Less
Submitted 14 February, 2020; v1 submitted 18 June, 2019;
originally announced June 2019.
-
DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions
Authors:
Ehsan Toreini,
Maryam Mehrnezhad,
Siamak F. Shahandashti,
Feng Hao
Abstract:
In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the `integrity' of the we…
▽ More
In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the `integrity' of the web content has received little attention. We implement two attacks on real-world online banking websites and show that ignoring the `integrity' of the web content can fundamentally defeat two-factor solutions. To address this problem, we propose a cryptographic protocol called DOMtegrity to ensure the end-to-end integrity of the DOM structure of a web page from delivering at a web server to the rendering of the page in the user's browser. DOMtegrity is the first solution that protects DOM integrity without modifying the browser architecture or requiring extra hardware. It works by exploiting subtle yet important differences between browser extensions and in-line JavaScript code. We show how DOMtegrity prevents the earlier attacks and a whole range of man-in-the-browser (MITB) attacks. We conduct extensive experiments on more than 14,000 real-world extensions to evaluate the effectiveness of DOMtegrity.
△ Less
Submitted 30 May, 2019;
originally announced May 2019.
-
On legitimate mining of cryptocurrency in the browser - a feasibility study
Authors:
Saulius Venskutonis,
Feng Hao,
Matthew Collison
Abstract:
Cryptocurrency mining in the browser has the potential to provide a new pay-as-you-go monetisation mechanism for consuming digital media over the Web. However, browser mining has recently received strong criticism due to illegitimate use of mining scripts in several popular websites (a practice called cryptojacking). Here we provide the first feasibility study of browser mining as a legitimate mea…
▽ More
Cryptocurrency mining in the browser has the potential to provide a new pay-as-you-go monetisation mechanism for consuming digital media over the Web. However, browser mining has recently received strong criticism due to illegitimate use of mining scripts in several popular websites (a practice called cryptojacking). Here we provide the first feasibility study of browser mining as a legitimate means of monetisation in terms of revenue, user consent and user experience within a specially built website. Our results compare browser mining to display advertisement and indicate browser mining provides a preferable user experience to advertising when the hash rate is user-adjustable. Furthermore, over 60% of participants would select browser mining over advertisement if they were invested in the ecosystem by obtaining half of the mined cryptocurrency. Our estimations show that browser mining currently generates revenue at a rate 46 times less than advertisement, however we would expect that gap to decrease as we observed a significant drop in mining difficulty after our tested cryptocurrency implemented ASIC-resistant mining measures. Overall, based on our results we find browser mining to be a legitimate alternative to display advertisement and conclude by discussing its current limitations and potential applications.
△ Less
Submitted 4 January, 2019; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Anchor-based Nearest Class Mean Loss for Convolutional Neural Networks
Authors:
Fusheng Hao,
Jun Cheng,
Lei Wang,
Xinchao Wang,
Jianzhong Cao,
Xi** Hu,
Dapeng Tao
Abstract:
Discriminative features are critical for machine learning applications. Most existing deep learning approaches, however, rely on convolutional neural networks (CNNs) for learning features, whose discriminant power is not explicitly enforced. In this paper, we propose a novel approach to train deep CNNs by imposing the intra-class compactness and the inter-class separability, so as to enhance the l…
▽ More
Discriminative features are critical for machine learning applications. Most existing deep learning approaches, however, rely on convolutional neural networks (CNNs) for learning features, whose discriminant power is not explicitly enforced. In this paper, we propose a novel approach to train deep CNNs by imposing the intra-class compactness and the inter-class separability, so as to enhance the learned features' discriminant power. To this end, we introduce anchors, which are predefined vectors regarded as the centers for each class and fixed during training. Discriminative features are obtained by constraining the deep CNNs to map training samples to the corresponding anchors as close as possible. We propose two principles to select the anchors, and measure the proximity of two points using the Euclidean and cosine distance metric functions, which results in two novel loss functions. These loss functions require no sample pairs or triplets and can be efficiently optimized by batch stochastic gradient descent. We test the proposed method on three benchmark image classification datasets and demonstrate its promising results.
△ Less
Submitted 22 April, 2018;
originally announced April 2018.
-
Cryptanalysis of a Chaotic Image Encryption Algorithm Based on Information Entropy
Authors:
Chengqing Li,
Dongdong Lin,
Bingbing Feng,
**hu Lü,
Feng Hao
Abstract:
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insec…
▽ More
Recently, a chaotic image encryption algorithm based on information entropy (IEAIE) was proposed. This paper scrutinizes the security properties of the algorithm and evaluates the validity of the used quantifiable security metrics. When the round number is only one, the equivalent secret key of every basic operation of IEAIE can be recovered with a differential attack separately. Some common insecurity problems in the field of chaotic image encryption are found in IEAIE, e.g. the short orbits of the digital chaotic system and the invalid sensitivity mechanism built on information entropy of the plain image. Even worse, each security metric is questionable, which undermines the security credibility of IEAIE. Hence, IEAIE can only serve as a counterexample for illustrating common pitfalls in designing secure communication method for image data.
△ Less
Submitted 25 November, 2018; v1 submitted 27 March, 2018;
originally announced March 2018.
-
Analysing and Patching SPEKE in ISO/IEC
Authors:
Feng Hao,
Roberto Metere,
Siamak F. Shahandashti,
Changyu Dong
Abstract:
Simple Password Exponential Key Exchange (SPEKE) is a well-known Password Authenticated Key Exchange (PAKE) protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products. It has also been included into international standards such as ISO/IEC 11770-4 and IEEE P1363.2. In this paper, we analyse the SPEKE protocol as specified in the ISO/IEC and…
▽ More
Simple Password Exponential Key Exchange (SPEKE) is a well-known Password Authenticated Key Exchange (PAKE) protocol that has been used in Blackberry phones for secure messaging and Entrust's TruePass end-to-end web products. It has also been included into international standards such as ISO/IEC 11770-4 and IEEE P1363.2. In this paper, we analyse the SPEKE protocol as specified in the ISO/IEC and IEEE standards. We identify that the protocol is vulnerable to two new attacks: an impersonation attack that allows an attacker to impersonate a user without knowing the password by launching two parallel sessions with the victim, and a key-malleability attack that allows a man-in-the-middle (MITM) to manipulate the session key without being detected by the end users. Both attacks have been acknowledged by the technical committee of ISO/IEC SC 27, and ISO/IEC 11770-4 revised as a result. We propose a patched SPEKE called P-SPEKE and present a formal analysis in the Applied Pi Calculus using ProVerif to show that the proposed patch prevents both attacks. The proposed patch has been included into the latest revision of ISO/IEC 11770-4 published in 2017.
△ Less
Submitted 4 April, 2018; v1 submitted 13 February, 2018;
originally announced February 2018.
-
Vanishing theorems for parabolic Higgs bundles
Authors:
Donu Arapura,
Feng Hao,
Hongshan Li
Abstract:
This is a sequel to "Kodaira-Saito vanishing via Higgs bundles in positive characteristic" (arXiv:1611.09880). However, unlike the previous paper, all the arguments here are in characteristic zero. The main result is a Kodaira vanishing theorem for semistable parabolic Higgs bundles with trivial parabolic Chern classes. This implies a general semipositivity theorem. This also implies a Kodaira-Sai…
▽ More
This is a sequel to "Kodaira-Saito vanishing via Higgs bundles in positive characteristic" (arXiv:1611.09880). However, unlike the previous paper, all the arguments here are in characteristic zero. The main result is a Kodaira vanishing theorem for semistable parabolic Higgs bundles with trivial parabolic Chern classes. This implies a general semipositivity theorem. This also implies a Kodaira-Saito vanishing theorem for complex variations of Hodge structure.
△ Less
Submitted 30 August, 2018; v1 submitted 8 January, 2018;
originally announced January 2018.
-
Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography
Authors:
Chengqing Li,
Dongdong Lin,
**hu Lü,
Feng Hao
Abstract:
This paper analyzes the security of an image encryption algorithm proposed by Ye and Huang [\textit{IEEE MultiMedia}, vol. 23, pp. 64-71, 2016]. The Ye-Huang algorithm uses electrocardiography (ECG) signals to generate the initial key for a chaotic system and applies an autoblocking method to divide a plain image into blocks of certain sizes suitable for subsequent encryption. The designers claime…
▽ More
This paper analyzes the security of an image encryption algorithm proposed by Ye and Huang [\textit{IEEE MultiMedia}, vol. 23, pp. 64-71, 2016]. The Ye-Huang algorithm uses electrocardiography (ECG) signals to generate the initial key for a chaotic system and applies an autoblocking method to divide a plain image into blocks of certain sizes suitable for subsequent encryption. The designers claimed that the proposed algorithm is "strong and flexible enough for practical applications". In this paper, we perform a thorough analysis of their algorithm from the view point of modern cryptography. We find it is vulnerable to the known plaintext attack: based on one pair of a known plain-image and its corresponding cipher-image, an adversary is able to derive a mask image, which can be used as an equivalent secret key to successfully decrypt other cipher-images encrypted under the same key with a non-negligible probability of 1/256. Using this as a typical counterexample, we summarize security defects in the design of the Ye-Huang algorithm. The lessons are generally applicable to many other image encryption schemes.
△ Less
Submitted 8 June, 2018; v1 submitted 6 November, 2017;
originally announced November 2017.
-
Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions
Authors:
Raffaello Perrotta,
Feng Hao
Abstract:
Browser extensions have been established as a common feature present in modern browsers. However, some extension systems risk exposing APIs which are too permissive and cohesive with the browser's internal structure, thus leaving a hole for malicious developers to exploit security critical functionality within the browser itself. In this paper, we raise the awareness of the threats caused by brows…
▽ More
Browser extensions have been established as a common feature present in modern browsers. However, some extension systems risk exposing APIs which are too permissive and cohesive with the browser's internal structure, thus leaving a hole for malicious developers to exploit security critical functionality within the browser itself. In this paper, we raise the awareness of the threats caused by browser extensions by presenting a botnet framework based on malicious extensions installed in the user's browser, and an exhaustive range of attacks that can be launched in this framework. We systematically categorize, describe and implement these attacks against Chrome, Firefox and Firefox-for-Android, and verify experiments on Windows, Linux and Android systems. To the best of our knowledge, this paper presents to date the most comprehensive analysis about the threats of botnet in modern browsers due to the over-privileged capabilities possessed by browser extensions. We also discuss countermeasures to the identified problems.
△ Less
Submitted 27 September, 2017;
originally announced September 2017.
-
Weak Bounded Negativity Conjecture
Authors:
Feng Hao
Abstract:
In this paper, we prove the following "Weak Bounded Negativity Conjecture", which says that given a complex smooth projective surface $X$, for any reduced curve $C$ in $X$ and integer $g$, assume that the geometric genus of each component of $C$ is bounded from above by $g$, then the self-intersection number $C^2$ is bounded from below.
In this paper, we prove the following "Weak Bounded Negativity Conjecture", which says that given a complex smooth projective surface $X$, for any reduced curve $C$ in $X$ and integer $g$, assume that the geometric genus of each component of $C$ is bounded from above by $g$, then the self-intersection number $C^2$ is bounded from below.
△ Less
Submitted 30 August, 2017;
originally announced August 2017.
-
An Algorithm of Parking Planning for Smart Parking System
Authors:
Xuejian Zhao,
Kui Zhao,
Feng Ha
Abstract:
There are so many vehicles in the world and the number of vehicles is increasing rapidly. To alleviate the parking problems caused by that, the smart parking system has been developed. The parking planning is one of the most important parts of it. An effective parking planning strategy makes the better use of parking resources possible. In this paper, we present a feasible method to do parking pla…
▽ More
There are so many vehicles in the world and the number of vehicles is increasing rapidly. To alleviate the parking problems caused by that, the smart parking system has been developed. The parking planning is one of the most important parts of it. An effective parking planning strategy makes the better use of parking resources possible. In this paper, we present a feasible method to do parking planning. We transform the parking planning problem into a kind of linear assignment problem. We take vehicles as jobs and parking spaces as agents. We take distances between vehicles and parking spaces as costs for agents doing jobs. Then we design an algorithm for this particular assignment problem and solve the parking planning problem. The method proposed can give timely and efficient guide information to vehicles for a real time smart parking system. Finally, we show the effectiveness of the method with experiments over some data, which can simulate the situation of doing parking planning in the real world.
△ Less
Submitted 26 August, 2017;
originally announced August 2017.
-
1-Motives Associated to the Limiting Mixed Hodge Structures of Degenerations of Curves
Authors:
Feng Hao
Abstract:
In this article, we will give the Deligne 1-motives up to isogeny corresponding to the $\mathbb{Q}$-limiting mixed Hodge structures of semi-stable degenerations of curves, by using logarithmic structures and Steenbrink's cohomological mixed Hodge complexes associated to semi-stable degenerations of curves.
In this article, we will give the Deligne 1-motives up to isogeny corresponding to the $\mathbb{Q}$-limiting mixed Hodge structures of semi-stable degenerations of curves, by using logarithmic structures and Steenbrink's cohomological mixed Hodge complexes associated to semi-stable degenerations of curves.
△ Less
Submitted 13 October, 2018; v1 submitted 26 July, 2017;
originally announced July 2017.
-
Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns
Authors:
Ehsan Toreini,
Siamak F. Shahandashti,
Feng Hao
Abstract:
In this paper, we propose a novel paper fingerprinting technique based on analyzing the translucent patterns revealed when a light source shines through the paper. These patterns represent the inherent texture of paper, formed by the random interleaving of wooden particles during the manufacturing process. We show these patterns can be easily captured by a commodity camera and condensed into to a…
▽ More
In this paper, we propose a novel paper fingerprinting technique based on analyzing the translucent patterns revealed when a light source shines through the paper. These patterns represent the inherent texture of paper, formed by the random interleaving of wooden particles during the manufacturing process. We show these patterns can be easily captured by a commodity camera and condensed into to a compact 2048-bit fingerprint code. Prominent works in this area (Nature 2005, IEEE S&P 2009, CCS 2011) have all focused on fingerprinting paper based on the paper "surface". We are motivated by the observation that capturing the surface alone misses important distinctive features such as the non-even thickness, the random distribution of impurities, and different materials in the paper with varying opacities. Through experiments, we demonstrate that the embedded paper texture provides a more reliable source for fingerprinting than features on the surface. Based on the collected datasets, we achieve 0% false rejection and 0% false acceptance rates. We further report that our extracted fingerprints contain 807 degrees-of-freedom (DoF), which is much higher than the 249 DoF with iris codes (that have the same size of 2048 bits). The high amount of DoF for texture-based fingerprints makes our method extremely scalable for recognition among very large databases; it also allows secure usage of the extracted fingerprint in privacy-preserving authentication schemes based on error correction techniques.
△ Less
Submitted 7 May, 2019; v1 submitted 6 May, 2017;
originally announced May 2017.
-
Mechanical analysis of pimple growth and pain level characterization
Authors:
Xiangbiao Liao,
Xiaobin Deng,
LiangLiang Zhu,
Feng Hao,
Hang Xiao,
Xiaoyang Shi,
Xi Chen
Abstract:
Pimple is one of the most common skin diseases for humans. The mechanical modeling of pimple growth is very limited. A finite element model is developed to quantify the deformation field with the expansion of follicle, and then the mechanical stimulus is related to the sensation of pain during the development of pimple. Through these models, parametric studies show the dependence of mechanical sti…
▽ More
Pimple is one of the most common skin diseases for humans. The mechanical modeling of pimple growth is very limited. A finite element model is developed to quantify the deformation field with the expansion of follicle, and then the mechanical stimulus is related to the sensation of pain during the development of pimple. Through these models, parametric studies show the dependence of mechanical stimulus and pain level on the pimple-surrounded structures, follicle depth and mechanical properties of the epidermis. The findings in this paper may provide useful insights on prevention or pain relief of pimples, as well as those related to cosmetics and other tissue growth.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
Unconventional Localization Prior to Wrinkles and Controllable Surface Patterns of Film Substrate Bilayers Through Patterned Defects in Substrate
Authors:
Xiangbiao Liao,
Liangliang Zhu,
Hang Xiao,
Junan Pan,
Feng Hao,
Xiaoyang Shi,
Xi Chen
Abstract:
A novel bilayer is introduced, consisting of a stiff film adhered to a soft substrate with patterned holes beneath the film and substrate interface. To uncover the transition of surface patterns, two dimensional plane strain simulations are performed on the defected bilayer subjected to uniaxial compression. Although the substrate is considered as the linear elastic material, the presence of defec…
▽ More
A novel bilayer is introduced, consisting of a stiff film adhered to a soft substrate with patterned holes beneath the film and substrate interface. To uncover the transition of surface patterns, two dimensional plane strain simulations are performed on the defected bilayer subjected to uniaxial compression. Although the substrate is considered as the linear elastic material, the presence of defects can directly trigger the formation of locally ridged and then folding configurations from flat surface with a relatively small compressive strain. It is followed by the coexisting phases of folds and wrinkles under further overall compression. This phase transition reverses the traditional transition of wrinkle to ridge or fold for defect free substrates. It is also found that the onset of initial bifurcation is highly dependent on the spatial configuration and geometries of holes, since the interaction of defects allows more strain relief mechanisms beyond wrinkling. Furthermore, a rich diversity of periodic surface topologies, including overall waves, localizations, saw like and coexisting features of folds and wrinkles can be obtained by varying the diameter, depth and spacing of holes as well as compressive strain, which provides a potential approach to engineer various surface patterns for applications.
△ Less
Submitted 29 March, 2017;
originally announced March 2017.
-
Investigating multi-frequency pulse profiles of PSRs B0329+54 and B1642-03 in an inverse Compton scattering (ICS) model
Authors:
L. H. Shang,
J. G. Lu,
Y. J. Du,
L. F. Hao,
D. Li,
K. J. Lee,
Bin Li,
L. X. Li,
G. J. Qiao,
Z. Q. Shen,
D. H. Wang,
M. Wang,
X. J. Wu,
Y. J. Wu,
R. X. Xu,
Y. L. Yue,
Z. Yan,
Q. J. Zhi,
R. B. Zhao,
R. S. Zhao
Abstract:
The emission geometries, e.g. the emission region height, the beam shape, and radius-to-frequency map**, are important predictions of pulsar radiation model. The multi-band radio observations carry such valuable information. In this paper, we study two bright pulsars, (PSRs B0329+54 and B1642-03) and observe them in high frequency (2.5 GHz, 5 GHz, and 8 GHz). The newly acquired data together wit…
▽ More
The emission geometries, e.g. the emission region height, the beam shape, and radius-to-frequency map**, are important predictions of pulsar radiation model. The multi-band radio observations carry such valuable information. In this paper, we study two bright pulsars, (PSRs B0329+54 and B1642-03) and observe them in high frequency (2.5 GHz, 5 GHz, and 8 GHz). The newly acquired data together with historical archive provide an atlas of multi-frequency profiles spanning from 100 MHz to 10 GHz. We study the frequency evolution of pulse profiles and the radiation regions with the these data. We firstly fit the pulse profiles with Gaussian functions to determine the phase of each component, and then calculate the radiation altitudes of different emission components and the radiation regions. We find that the inverse Compton scattering (ICS) model can reproduce the radiation geometry of these two pulsars. But for PSR B0329+54 the radiation can be generated in either annular gap (AG) or core gap (CG), while the radiation of PSR B1642-03 can only be generated in the CG. This difference is caused by the inclination angle and the impact angle of these two pulsars. The relation of beaming angle (the angle between the radiation direction and the magnetic axis) and the radiation altitudes versus frequency is also presented by modelling the beam-frequency evolution in the ICS model. The multi-band pulse profiles of these two pulsars can be described well by the ICS model combined with the CG and AG.
△ Less
Submitted 10 March, 2017;
originally announced March 2017.
-
Predicting a Two-dimensional P2S3 Monolayer: A Global Minimum Structure
Authors:
Hang Xiao,
Xiaoyang Shi,
Feng Hao,
Xiangbiao Liao,
Yayun Zhang,
Xi Chen
Abstract:
Based on extensive evolutionary algorithm driven structural search, we propose a new diphosphorus trisulfide (P2S3) 2D crystal, which is dynamically, thermally and chemically stable as confirmed by the computed phonon spectrum and ab initio molecular dynamics simulations. This 2D crystalline phase of P2S3 corresponds to the global minimum in the Born-Oppenheimer surface of the phosphorus sulfide m…
▽ More
Based on extensive evolutionary algorithm driven structural search, we propose a new diphosphorus trisulfide (P2S3) 2D crystal, which is dynamically, thermally and chemically stable as confirmed by the computed phonon spectrum and ab initio molecular dynamics simulations. This 2D crystalline phase of P2S3 corresponds to the global minimum in the Born-Oppenheimer surface of the phosphorus sulfide monolayers with 2:3 stoichiometries. It is a wide band gap (4.55 eV) semiconductor with P-S σ bonds. The electronic properties of P2S3 structure can be modulated by stacking into multilayer P2S3 structures, forming P2S3 nanoribbons or rolling into P2S3 nanotubes, expanding its potential applications for the emerging field of 2D electronics.
△ Less
Submitted 1 March, 2017;
originally announced March 2017.
-
The catalytic effect of water in basic hydrolysis of CO$_3{}^{2_-}$ in hydrated clusters
Authors:
Hang Xiao,
Xiaoyang Shi,
Yayun Zhang,
Xiangbiao Liao,
Feng Hao,
Klaus S. Lackner,
Xi Chen
Abstract:
The hydration of ions in nanoscale hydrated clusters is ubiquitous and essential in many physical and chemical processes. Here we show that the hydrolysis reaction is strongly affected by relative humidity. The hydrolysis of CO32- with n = 1-8 water molecules is investigated by ab initio method. For n = 1-5 water molecules, all the reactants follow a stepwise pathway to the transition state. For n…
▽ More
The hydration of ions in nanoscale hydrated clusters is ubiquitous and essential in many physical and chemical processes. Here we show that the hydrolysis reaction is strongly affected by relative humidity. The hydrolysis of CO32- with n = 1-8 water molecules is investigated by ab initio method. For n = 1-5 water molecules, all the reactants follow a stepwise pathway to the transition state. For n = 6-8 water molecules, all the reactants undergo a direct proton transfer to the transition state with overall lower activation free energy. The activation free energy of the reaction is dramatically reduced from 10.4 to 2.4 kcal/mol as the number of water molecules increases from 1 to 6. Meanwhile, the degree of the hydrolysis of CO32- is significantly increased compared to the bulk water solution scenario. The incomplete hydration shells facilitate the hydrolysis of CO32- with few water molecules (especially for n = 6) to be not only thermodynamically favorable but also kinetically favorable. This discovery provides valuable insights for designing efficient sorbents including that for CO2 air capture.
△ Less
Submitted 9 February, 2017;
originally announced February 2017.
-
Development of a Transferable Reactive Force Field of P/H Systems: Application to the Chemical and Mechanical Properties of Phosphorene
Authors:
Hang Xiao,
Xiaoyang Shi,
Feng Hao,
Xiangbiao Liao,
Yayun Zhang,
Xi Chen
Abstract:
ReaxFF provides a method to model reactive chemical systems in large-scale molecular dynamics simulations. Here, we developed ReaxFF parameters for phosphorus and hydrogen to give a good description of the chemical and mechanical properties of pristine and defected black phosphorene. ReaxFF for P/H is transferable to a wide range of phosphorus and hydrogen containing systems including bulk black p…
▽ More
ReaxFF provides a method to model reactive chemical systems in large-scale molecular dynamics simulations. Here, we developed ReaxFF parameters for phosphorus and hydrogen to give a good description of the chemical and mechanical properties of pristine and defected black phosphorene. ReaxFF for P/H is transferable to a wide range of phosphorus and hydrogen containing systems including bulk black phosphorus, blue phosphorene, edge-hydrogenated phosphorene, phosphorus clusters and phosphorus hydride molecules. The potential parameters were obtained by conducting unbiased global optimization with respect to a set of reference data generated by extensive ab initio calculations. We extend ReaxFF by adding a 60° correction term which significantly improves the description of phosphorus clusters. Emphasis has been put on obtaining a good description of mechanical response of black phosphorene with different types of defects. Compared to nonreactive SW potential [1], ReaxFF for P/H systems provides a huge improvement in describing the mechanical properties the pristine and defected black phosphorene and the thermal stability of phosphorene nanotubes. A counterintuitive phenomenon is observed that single vacancies weaken the black phosphorene more than double vacancies with higher formation energy. Our results also show that mechanical response of black phosphorene is more sensitive to defects for the zigzag direction than for the armchair direction. Since ReaxFF allows straightforward extensions to the heterogeneous systems, such as oxides, nitrides, ReaxFF parameters for P/H systems build a solid foundation for the reactive force field description of heterogeneous P systems, including P-containing 2D van der Waals heterostructures, oxides, etc.
△ Less
Submitted 10 April, 2017; v1 submitted 7 February, 2017;
originally announced February 2017.
-
A micrometer-thick oxide film with high thermoelectric performance at temperature ranging from 20-400 K
Authors:
Jikun Chen,
Hongyi Chen,
Feng Hao,
Xinyou Ke,
Nuofu Chen,
Takeaki Yajima,
Yong Jiang,
Xun Shi,
Kexiong Zhou,
Max Döbeli,
Tiansong Zhang,
Binghui Ge,
Hongliang Dong,
Huarong Zeng Wenwang Wu,
Lidong Chen
Abstract:
Thermoelectric (TE) materials achieve localised conversion between thermal and electric energies, and the conversion efficiency is determined by a figure of merit zT. Up to date, two-dimensional electron gas (2DEG) related TE materials hold the records for zT near room-temperature. A sharp increase in zT up to ~2.0 was observed previously for superlattice materials such as PbSeTe, Bi2Te3/Sb2Te3 an…
▽ More
Thermoelectric (TE) materials achieve localised conversion between thermal and electric energies, and the conversion efficiency is determined by a figure of merit zT. Up to date, two-dimensional electron gas (2DEG) related TE materials hold the records for zT near room-temperature. A sharp increase in zT up to ~2.0 was observed previously for superlattice materials such as PbSeTe, Bi2Te3/Sb2Te3 and SrNb0.2Ti0.8O3/SrTiO3, when the thicknesses of these TE materials were spatially confine within sub-nanometre scale. The two-dimensional confinement of carriers enlarges the density of states near the Fermi energy3-6 and triggers electron phonon coupling. This overcomes the conventional σ-S trade-off to more independently improve S, and thereby further increases thermoelectric power factors (PF=S2σ). Nevertheless, practical applications of the present 2DEG materials for high power energy conversions are impeded by the prerequisite of spatial confinement, as the amount of TE material is insufficient. Here, we report similar TE properties to 2DEGs but achieved in SrNb0.2Ti0.8O3 films with thickness within sub-micrometer scale by regulating interfacial and lattice polarizations. High power factor (up to 103 μWcm-1K-2) and zT value (up to 1.6) were observed for the film materials near room-temperature and below. Even reckon in the thickness of the substrate, an integrated power factor of both film and substrate approaching to be 102 μWcm-1K-2 was achieved in a 2 μm-thick SrNb0.2Ti0.8O3 film grown on a 100 μm-thick SrTiO3 substrate. The dependence of high TE performances on size-confinement is reduced by ~103 compared to the conventional 2DEG-related TE materials. As-grown oxide films are less toxic and not dependent on large amounts of heavy elements, potentially paving the way towards applications in localised refrigeration and electric power generations.
△ Less
Submitted 28 January, 2017;
originally announced January 2017.