-
knn-seq: Efficient, Extensible kNN-MT Framework
Authors:
Hiroyuki Deguchi,
Hayate Hirano,
Tomoki Hoshino,
Yuto Nishida,
Justin Vasselli,
Taro Watanabe
Abstract:
k-nearest-neighbor machine translation (kNN-MT) boosts the translation quality of a pre-trained neural machine translation (NMT) model by utilizing translation examples during decoding. Translation examples are stored in a vector database, called a datastore, which contains one entry for each target token from the parallel data it is made from. Due to its size, it is computationally expensive both…
▽ More
k-nearest-neighbor machine translation (kNN-MT) boosts the translation quality of a pre-trained neural machine translation (NMT) model by utilizing translation examples during decoding. Translation examples are stored in a vector database, called a datastore, which contains one entry for each target token from the parallel data it is made from. Due to its size, it is computationally expensive both to construct and to retrieve examples from the datastore. In this paper, we present an efficient and extensible kNN-MT framework, knn-seq, for researchers and developers that is carefully designed to run efficiently, even with a billion-scale large datastore. knn-seq is developed as a plug-in on fairseq and easy to switch models and kNN indexes. Experimental results show that our implemented kNN-MT achieves a comparable gain to the original kNN-MT, and the billion-scale datastore construction took 2.21 hours in the WMT'19 German-to-English translation task. We publish our knn-seq as an MIT-licensed open-source project and the code is available on https://github.com/naist-nlp/knn-seq . The demo video is available on https://youtu.be/zTDzEOq80m0 .
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
On arithmetic Dijkgraaf-Witten theory
Authors:
Hikaru Hirano,
Junhyeong Kim,
Masanori Morishita
Abstract:
We present basic constructions and properties in arithmetic Chern-Simons theory with finite gauge group along the line of topological quantum field theory. For a finite set $S$ of finite primes of a number field $k$, we construct arithmetic analogues of the Chern-Simons 1-cocycle, the prequantization bundle for a surface and the Chern-Simons functional for a $3$-manifold. We then construct arithme…
▽ More
We present basic constructions and properties in arithmetic Chern-Simons theory with finite gauge group along the line of topological quantum field theory. For a finite set $S$ of finite primes of a number field $k$, we construct arithmetic analogues of the Chern-Simons 1-cocycle, the prequantization bundle for a surface and the Chern-Simons functional for a $3$-manifold. We then construct arithmetic analogues for $k$ and $S$ of the quantum Hilbert space (space of conformal blocks) and the Dijkgraaf-Witten partition function in (2+1)-dimensional Chern-Simons TQFT. We show some basic and functorial properties of those arithmetic analogues. Finally we show decomposition and gluing formulas for arithmetic Chern-Simons invariants and arithmetic Dijkgraaf-Witten partition functions.
△ Less
Submitted 26 September, 2022; v1 submitted 4 June, 2021;
originally announced June 2021.
-
Classification of Hematoma: Joint Learning of Semantic Segmentation and Classification
Authors:
Hokuto Hirano,
Tsuyoshi Okita
Abstract:
Cerebral hematoma grows rapidly in 6-24 hours and misprediction of the growth can be fatal if it is not operated by a brain surgeon. There are two types of cerebral hematomas: one that grows rapidly and the other that does not grow rapidly. We are develo** the technique of artificial intelligence to determine whether the CT image includes the cerebral hematoma which leads to the rapid growth. Th…
▽ More
Cerebral hematoma grows rapidly in 6-24 hours and misprediction of the growth can be fatal if it is not operated by a brain surgeon. There are two types of cerebral hematomas: one that grows rapidly and the other that does not grow rapidly. We are develo** the technique of artificial intelligence to determine whether the CT image includes the cerebral hematoma which leads to the rapid growth. This problem has various difficulties: the few positive cases in this classification problem of cerebral hematoma and the targeted hematoma has deformable object. Other difficulties include the imbalance classification, the covariate shift, the small data, and the spurious correlation problems. It is difficult with the plain CNN classification such as VGG. This paper proposes the joint learning of semantic segmentation and classification and evaluate the performance of this.
△ Less
Submitted 31 March, 2021;
originally announced March 2021.
-
Vulnerability of deep neural networks for detecting COVID-19 cases from chest X-ray images to universal adversarial attacks
Authors:
Hokuto Hirano,
Kazuki Koga,
Kazuhiro Takemoto
Abstract:
Under the epidemic of the novel coronavirus disease 2019 (COVID-19), chest X-ray computed tomography imaging is being used for effectively screening COVID-19 patients. The development of computer-aided systems based on deep neural networks (DNNs) has been advanced, to rapidly and accurately detect COVID-19 cases, because the need for expert radiologists, who are limited in number, forms a bottlene…
▽ More
Under the epidemic of the novel coronavirus disease 2019 (COVID-19), chest X-ray computed tomography imaging is being used for effectively screening COVID-19 patients. The development of computer-aided systems based on deep neural networks (DNNs) has been advanced, to rapidly and accurately detect COVID-19 cases, because the need for expert radiologists, who are limited in number, forms a bottleneck for the screening. However, so far, the vulnerability of DNN-based systems has been poorly evaluated, although DNNs are vulnerable to a single perturbation, called universal adversarial perturbation (UAP), which can induce DNN failure in most classification tasks. Thus, we focus on representative DNN models for detecting COVID-19 cases from chest X-ray images and evaluate their vulnerability to UAPs generated using simple iterative algorithms. We consider nontargeted UAPs, which cause a task failure resulting in an input being assigned an incorrect label, and targeted UAPs, which cause the DNN to classify an input into a specific class. The results demonstrate that the models are vulnerable to nontargeted and targeted UAPs, even in case of small UAPs. In particular, 2% norm of the UPAs to the average norm of an image in the image dataset achieves >85% and >90% success rates for the nontargeted and targeted attacks, respectively. Due to the nontargeted UAPs, the DNN models judge most chest X-ray images as COVID-19 cases. The targeted UAPs make the DNN models classify most chest X-ray images into a given target class. The results indicate that careful consideration is required in practical applications of DNNs to COVID-19 diagnosis; in particular, they emphasize the need for strategies to address security concerns. As an example, we show that iterative fine-tuning of the DNN models using UAPs improves the robustness of the DNN models against UAPs.
△ Less
Submitted 22 May, 2020;
originally announced May 2020.
-
On mod 2 arithmetic Dijkgraaf-Witten invariants for certain real quadratic number fields
Authors:
Hikaru Hirano
Abstract:
Minhyong Kim introduced arithmetic Chern-Simons invariants for totally imaginary number fields as arithmetic analogues of the Chern-Simons invariants for 3-manifolds. In this paper, we extend Kim's definition for any number field, by using the modified étale cohomology groups and fundamental groups which take real places into account. We then show explicit formulas of mod 2 arithmetic Dijkgraaf-Wi…
▽ More
Minhyong Kim introduced arithmetic Chern-Simons invariants for totally imaginary number fields as arithmetic analogues of the Chern-Simons invariants for 3-manifolds. In this paper, we extend Kim's definition for any number field, by using the modified étale cohomology groups and fundamental groups which take real places into account. We then show explicit formulas of mod 2 arithmetic Dijkgraaf-Witten invariants for real quadratic fields $\mathbb{Q} (\sqrt{p_1 p_2 \cdots p_r})$, where $p_i$ is a prime number congruent to 1 mod 4, in terms of the Legendre symbols of $p_i$'s. We also show topological analogues of our formulas for 3-manifolds.
△ Less
Submitted 1 December, 2019; v1 submitted 29 November, 2019;
originally announced November 2019.
-
Simple iterative method for generating targeted universal adversarial perturbations
Authors:
Hokuto Hirano,
Kazuhiro Takemoto
Abstract:
Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, a single perturbation known as the universal adversarial perturbation (UAP) can foil most classification tasks conducted by DNNs. Thus, different methods for generating UAPs are required to fully evaluate the vulnerability of DNNs. A realistic evaluation would be with cases that consider targeted attacks; wherein the…
▽ More
Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, a single perturbation known as the universal adversarial perturbation (UAP) can foil most classification tasks conducted by DNNs. Thus, different methods for generating UAPs are required to fully evaluate the vulnerability of DNNs. A realistic evaluation would be with cases that consider targeted attacks; wherein the generated UAP causes DNN to classify an input into a specific class. However, the development of UAPs for targeted attacks has largely fallen behind that of UAPs for non-targeted attacks. Therefore, we propose a simple iterative method to generate UAPs for targeted attacks. Our method combines the simple iterative method for generating non-targeted UAPs and the fast gradient sign method for generating a targeted adversarial perturbation for an input. We applied the proposed method to state-of-the-art DNN models for image classification and proved the existence of almost imperceptible UAPs for targeted attacks; further, we demonstrated that such UAPs are easily generatable.
△ Less
Submitted 18 November, 2019; v1 submitted 15 November, 2019;
originally announced November 2019.
-
Arithmetic topology in Ihara theory II: Milnor invariants, dilogarithmic Heisenberg coverings and triple power residue symbols
Authors:
Hikaru Hirano,
Masanori Morishita
Abstract:
We introduce mod $l$ Milnor invariants of a Galois element associated to Ihara's Galois representation on the pro-$l$ fundamental group of a punctured projective line ($l$ being a prime number), as arithmetic analogues of Milnor invariants of a pure braid. We then show that triple quadratic (resp. cubic) residue symbols of primes in the rational (resp. Eisenstein) number field are expressed by mod…
▽ More
We introduce mod $l$ Milnor invariants of a Galois element associated to Ihara's Galois representation on the pro-$l$ fundamental group of a punctured projective line ($l$ being a prime number), as arithmetic analogues of Milnor invariants of a pure braid. We then show that triple quadratic (resp. cubic) residue symbols of primes in the rational (resp. Eisenstein) number field are expressed by mod $2$ (resp. mod $3$) triple Milnor invariants of Frobenius elements. For this, we introduce dilogarithmic mod $l$ Heisenberg ramified covering ${\cal D}^{(l)}$ of $\mathbb{P}^1$, which may be regarded as a higher analog of the dilogarithmic function, for the gerbe associated to the mod $l$ Heisenberg group, and we study the monodromy transformations of certain functions on ${\cal D}^{(l)}$ along the pro-$l$ longitudes of Frobenius elements for $l=2,3$.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
The Physics of the B Factories
Authors:
A. J. Bevan,
B. Golob,
Th. Mannel,
S. Prell,
B. D. Yabsley,
K. Abe,
H. Aihara,
F. Anulli,
N. Arnaud,
T. Aushev,
M. Beneke,
J. Beringer,
F. Bianchi,
I. I. Bigi,
M. Bona,
N. Brambilla,
J. B rodzicka,
P. Chang,
M. J. Charles,
C. H. Cheng,
H. -Y. Cheng,
R. Chistov,
P. Colangelo,
J. P. Coleman,
A. Drutskoy
, et al. (2009 additional authors not shown)
Abstract:
This work is on the Physics of the B Factories. Part A of this book contains a brief description of the SLAC and KEK B Factories as well as their detectors, BaBar and Belle, and data taking related issues. Part B discusses tools and methods used by the experiments in order to obtain results. The results themselves can be found in Part C.
Please note that version 3 on the archive is the auxiliary…
▽ More
This work is on the Physics of the B Factories. Part A of this book contains a brief description of the SLAC and KEK B Factories as well as their detectors, BaBar and Belle, and data taking related issues. Part B discusses tools and methods used by the experiments in order to obtain results. The results themselves can be found in Part C.
Please note that version 3 on the archive is the auxiliary version of the Physics of the B Factories book. This uses the notation alpha, beta, gamma for the angles of the Unitarity Triangle. The nominal version uses the notation phi_1, phi_2 and phi_3. Please cite this work as Eur. Phys. J. C74 (2014) 3026.
△ Less
Submitted 31 October, 2015; v1 submitted 24 June, 2014;
originally announced June 2014.
-
Existence of periodic solutions for the Lotka-Volterra type systems
Authors:
H. Hirano,
S. Rybicki
Abstract:
In this paper we prove the existence of non-stationary periodic solutions of delay Lotka-Volterra equations. In the proofs we use the degree for $S^1$-equivariant maps.
In this paper we prove the existence of non-stationary periodic solutions of delay Lotka-Volterra equations. In the proofs we use the degree for $S^1$-equivariant maps.
△ Less
Submitted 5 July, 2006;
originally announced July 2006.