-
Towards precision particle background estimation for future X-ray missions: correlated variability between Chandra ACIS and AMS
Authors:
Catherine E. Grant,
Eric D. Miller,
Marshall W. Bautz,
Richard Foster,
Ralph P. Kraft,
Steven Allen,
David N. Burrows
Abstract:
A science goal of many future X-ray observatories is map** the cosmic web through deep exposures of faint diffuse sources. Such observations require low background and the best possible knowledge of the remaining unrejected background. The dominant contribution to the background above 1-2 keV is from Galactic Cosmic Ray protons. Their flux and spectrum are modulated by the solar cycle but also b…
▽ More
A science goal of many future X-ray observatories is map** the cosmic web through deep exposures of faint diffuse sources. Such observations require low background and the best possible knowledge of the remaining unrejected background. The dominant contribution to the background above 1-2 keV is from Galactic Cosmic Ray protons. Their flux and spectrum are modulated by the solar cycle but also by solar activity on shorter timescales. Understanding this variability may prove crucial to reducing background uncertainty for ESA's Athena X-ray Observatory and other missions with large collecting area. We examine of the variability of the particle background as measured by ACIS on the Chandra X-ray Observatory and compare that variability to that measured by the Alpha Magnetic Spectrometer (AMS), a precision particle detector on the ISS. We show that cosmic ray proton variability measured by AMS is well matched to the ACIS background and can be used to estimate proton energies responsible for the background. We discuss how this can inform future missions.
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
Morphological Evolution of NMC Secondary Particles Through in situ electrochemical FIB/SEM experiment
Authors:
François Cadiou,
Tuan-Tu Nguyen,
Martin Bettge,
Zeliang Su,
Jonathan Ando,
Vincent De Andrade,
Dean Miller,
Arnaud Demortière
Abstract:
Microstructural evolution of NMC secondary particles during the battery operation drives the electrochemical performance and impacts the Li-ion battery lifetime. In this work, we develop an in situ methodology using the FIB/SEM instrument to cycle single secondary particles of NMC active materials while following the modifications of their 3D morphology. Two types of secondary particles, i.e. low…
▽ More
Microstructural evolution of NMC secondary particles during the battery operation drives the electrochemical performance and impacts the Li-ion battery lifetime. In this work, we develop an in situ methodology using the FIB/SEM instrument to cycle single secondary particles of NMC active materials while following the modifications of their 3D morphology. Two types of secondary particles, i.e. low and high gradient NMC, were studied alongside morphological investigations in both pristine state and different number of cycles. The quantification of initial inner porosity and cracking evolution upon electrochemical cycling reveals a clear divergence depending on the type of gradient particles. An unexpected enhancement of the discharge capacity is observed during the first cycles concurrently to the appearance of inner cracks. At the first stages, impedance spectroscopy shows a charge transfer resistance reduction that suggests a widening of the crack network connected to the surface, which leads to an increase of contact area between liquid electrolyte and NMC particle. 3D microstructure of individual secondary particles after in situ cycles were investigated using FIB/SEM and nano-XCT. The results suggest a strong impact of the initial porosity shape on the degradation rate.
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
The Simons Observatory: Complex Impedance Measurements for a Full Focal-Plane Module
Authors:
Jack Lashner,
Joseph Seibert,
Max Silva-Feaver,
Tanay Bhandarkar,
Kevin T. Crowley,
Shannon M. Duff,
Daniel Dutcher,
Kathleen Harrington,
Shawn W. Henderson,
Amber D. Miller,
Michael Niemack,
Suzanne Staggs,
Yuhan Wang,
Kaiwen Zheng
Abstract:
The Simons Observatory (SO) is a ground based Cosmic Microwave Background experiment that will be deployed to the Atacama Desert in Chile. SO will field over 60,000 transition edge sensor (TES) bolometers that will observe in six spectral bands between 27 GHz and 280 GHz with the goal of revealing new information about the origin and evolution of the universe. SO detectors are grouped based on the…
▽ More
The Simons Observatory (SO) is a ground based Cosmic Microwave Background experiment that will be deployed to the Atacama Desert in Chile. SO will field over 60,000 transition edge sensor (TES) bolometers that will observe in six spectral bands between 27 GHz and 280 GHz with the goal of revealing new information about the origin and evolution of the universe. SO detectors are grouped based on their observing frequency and packaged into Universal Focal Plane Modules, each containing up to 1720 detectors which are read out using microwave SQUID multiplexing and the SLAC Microresonator Radio Frequency Electronics (\smurf). By measuring the complex impedance of a TES we are able to access many thermoelectric properties of the detector that are difficult to determine using other calibration methods, however it has been difficult historically to measure complex impedance for many detectors at once due to high sample rate requirements. Here we present a method which uses \smurf\ to measure the complex impedance of hundreds of detectors simultaneously on hour-long timescales. We compare the measured effective thermal time constants to those estimated independently with bias steps. This new method opens up the possibility for using this characterization tool both in labs and at the site to better understand the full population of SO detectors.
△ Less
Submitted 24 July, 2022;
originally announced July 2022.
-
Large Scale Radio Frequency Signal Classification
Authors:
Luke Boegner,
Manbir Gulati,
Garrett Vanhoy,
Phillip Vallance,
Bradley Comar,
Silvija Kokalj-Filipovic,
Craig Lennon,
Robert D. Miller
Abstract:
Existing datasets used to train deep learning models for narrowband radio frequency (RF) signal classification lack enough diversity in signal types and channel impairments to sufficiently assess model performance in the real world. We introduce the Sig53 dataset consisting of 5 million synthetically-generated samples from 53 different signal classes and expertly chosen impairments. We also introd…
▽ More
Existing datasets used to train deep learning models for narrowband radio frequency (RF) signal classification lack enough diversity in signal types and channel impairments to sufficiently assess model performance in the real world. We introduce the Sig53 dataset consisting of 5 million synthetically-generated samples from 53 different signal classes and expertly chosen impairments. We also introduce TorchSig, a signals processing machine learning toolkit that can be used to generate this dataset. TorchSig incorporates data handling principles that are common to the vision domain, and it is meant to serve as an open-source foundation for future signals machine learning research. Initial experiments using the Sig53 dataset are conducted using state of the art (SoTA) convolutional neural networks (ConvNets) and Transformers. These experiments reveal Transformers outperform ConvNets without the need for additional regularization or a ConvNet teacher, which is contrary to results from the vision domain. Additional experiments demonstrate that TorchSig's domain-specific data augmentations facilitate model training, which ultimately benefits model performance. Finally, TorchSig supports on-the-fly synthetic data creation at training time, thus enabling massive scale training sessions with virtually unlimited datasets.
△ Less
Submitted 20 July, 2022;
originally announced July 2022.
-
Shor-Laflamme distributions of graph states and noise robustness of entanglement
Authors:
Daniel Miller,
Daniel Loss,
Ivano Tavernelli,
Hermann Kampermann,
Dagmar Bruß,
Nikolai Wyderka
Abstract:
The Shor-Laflamme distribution (SLD) of a quantum state is a collection of local unitary invariants that quantify $k$-body correlations. We show that the SLD of graph states can be derived by solving a graph-theoretical problem. In this way, the mean and variance of the SLD are obtained as simple functions of efficiently computable graph properties. Furthermore, this formulation enables us to deri…
▽ More
The Shor-Laflamme distribution (SLD) of a quantum state is a collection of local unitary invariants that quantify $k$-body correlations. We show that the SLD of graph states can be derived by solving a graph-theoretical problem. In this way, the mean and variance of the SLD are obtained as simple functions of efficiently computable graph properties. Furthermore, this formulation enables us to derive closed expressions of SLDs for some graph state families. For cluster states, we observe that the SLD is very similar to a binomial distribution, and we argue that this property is typical for graph states in general. Finally, we derive an SLD-based entanglement criterion from the purity criterion and apply it to derive meaningful noise thresholds for entanglement. Our new entanglement criterion is easy to use and also applies to the case of higher-dimensional qudits. In the bigger picture, our results foster the understanding both of quantum error-correcting codes, where a closely related notion of Shor-Laflamme distributions plays an important role, and of the geometry of quantum states, where Shor-Laflamme distributions are known as sector length distributions.
△ Less
Submitted 24 July, 2023; v1 submitted 15 July, 2022;
originally announced July 2022.
-
Stronger Together: Air-Ground Robotic Collaboration Using Semantics
Authors:
Ian D. Miller,
Fernando Cladera,
Trey Smith,
Camillo Jose Taylor,
Vijay Kumar
Abstract:
In this work, we present an end-to-end heterogeneous multi-robot system framework where ground robots are able to localize, plan, and navigate in a semantic map created in real time by a high-altitude quadrotor. The ground robots choose and deconflict their targets independently, without any external intervention. Moreover, they perform cross-view localization by matching their local maps with the…
▽ More
In this work, we present an end-to-end heterogeneous multi-robot system framework where ground robots are able to localize, plan, and navigate in a semantic map created in real time by a high-altitude quadrotor. The ground robots choose and deconflict their targets independently, without any external intervention. Moreover, they perform cross-view localization by matching their local maps with the overhead map using semantics. The communication backbone is opportunistic and distributed, allowing the entire system to operate with no external infrastructure aside from GPS for the quadrotor. We extensively tested our system by performing different missions on top of our framework over multiple experiments in different environments. Our ground robots travelled over 6 km autonomously with minimal intervention in the real world and over 96 km in simulation without interventions.
△ Less
Submitted 28 June, 2022;
originally announced June 2022.
-
Never mind the metrics -- what about the uncertainty? Visualising confusion matrix metric distributions
Authors:
David Lovell,
Dimity Miller,
Jaiden Capra,
Andrew Bradley
Abstract:
There are strong incentives to build models that demonstrate outstanding predictive performance on various datasets and benchmarks. We believe these incentives risk a narrow focus on models and on the performance metrics used to evaluate and compare them -- resulting in a growing body of literature to evaluate and compare metrics. This paper strives for a more balanced perspective on classifier pe…
▽ More
There are strong incentives to build models that demonstrate outstanding predictive performance on various datasets and benchmarks. We believe these incentives risk a narrow focus on models and on the performance metrics used to evaluate and compare them -- resulting in a growing body of literature to evaluate and compare metrics. This paper strives for a more balanced perspective on classifier performance metrics by highlighting their distributions under different models of uncertainty and showing how this uncertainty can easily eclipse differences in the empirical performance of classifiers. We begin by emphasising the fundamentally discrete nature of empirical confusion matrices and show how binary matrices can be meaningfully represented in a three dimensional compositional lattice, whose cross-sections form the basis of the space of receiver operating characteristic (ROC) curves. We develop equations, animations and interactive visualisations of the contours of performance metrics within (and beyond) this ROC space, showing how some are affected by class imbalance. We provide interactive visualisations that show the discrete posterior predictive probability mass functions of true and false positive rates in ROC space, and how these relate to uncertainty in performance metrics such as Balanced Accuracy (BA) and the Matthews Correlation Coefficient (MCC). Our hope is that these insights and visualisations will raise greater awareness of the substantial uncertainty in performance metric estimates that can arise when classifiers are evaluated on empirical datasets and benchmarks, and that classification model performance claims should be tempered by this understanding.
△ Less
Submitted 5 June, 2022;
originally announced June 2022.
-
Experimental evaluation of digitally-verifiable photonic computing for blockchain and cryptocurrency
Authors:
Sunil Pai,
Taewon Park,
Marshall Ball,
Bogdan Penkovsky,
Maziyar Milanizadeh,
Michael Dubrovsky,
Nathnael Abebe,
Francesco Morichetti,
Andrea Melloni,
Shanhui Fan,
Olav Solgaard,
David A. B. Miller
Abstract:
As blockchain technology and cryptocurrency become increasingly mainstream, ever-increasing energy costs required to maintain the computational power running these decentralized platforms create a market for more energy-efficient hardware. Photonic cryptographic hash functions, which use photonic integrated circuits to accelerate computation, promise energy efficiency for verifying transactions an…
▽ More
As blockchain technology and cryptocurrency become increasingly mainstream, ever-increasing energy costs required to maintain the computational power running these decentralized platforms create a market for more energy-efficient hardware. Photonic cryptographic hash functions, which use photonic integrated circuits to accelerate computation, promise energy efficiency for verifying transactions and mining in a cryptonetwork. Like many analog computing approaches, however, current proposals for photonic cryptographic hash functions that promise similar security guarantees as Bitcoin are susceptible to systematic error, so multiple devices may not reach a consensus on computation despite high numerical precision (associated with low photodetector noise). In this paper, we theoretically and experimentally demonstrate that a more general family of robust discrete analog cryptographic hash functions, which we introduce as LightHash, leverages integer matrix-vector operations on photonic mesh networks of interferometers. The difficulty of LightHash can be adjusted to be sufficiently tolerant to systematic error (calibration error, loss error, coupling error, and phase error) and preserve inherent security guarantees present in the Bitcoin protocol. Finally, going beyond our proof-of-concept, we define a ``photonic advantage'' criterion and justify how recent developments in CMOS optoelectronics (including analog-digital conversion) provably achieve such advantage for robust and digitally-verifiable photonic computing and ultimately generate a new market for decentralized photonic technology.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
Experimentally realized in situ backpropagation for deep learning in nanophotonic neural networks
Authors:
Sunil Pai,
Zhanghao Sun,
Tyler W. Hughes,
Taewon Park,
Ben Bartlett,
Ian A. D. Williamson,
Momchil Minkov,
Maziyar Milanizadeh,
Nathnael Abebe,
Francesco Morichetti,
Andrea Melloni,
Shanhui Fan,
Olav Solgaard,
David A. B. Miller
Abstract:
Neural networks are widely deployed models across many scientific disciplines and commercial endeavors ranging from edge computing and sensing to large-scale signal processing in data centers. The most efficient and well-entrenched method to train such networks is backpropagation, or reverse-mode automatic differentiation. To counter an exponentially increasing energy budget in the artificial inte…
▽ More
Neural networks are widely deployed models across many scientific disciplines and commercial endeavors ranging from edge computing and sensing to large-scale signal processing in data centers. The most efficient and well-entrenched method to train such networks is backpropagation, or reverse-mode automatic differentiation. To counter an exponentially increasing energy budget in the artificial intelligence sector, there has been recent interest in analog implementations of neural networks, specifically nanophotonic neural networks for which no analog backpropagation demonstration exists. We design mass-manufacturable silicon photonic neural networks that alternately cascade our custom designed "photonic mesh" accelerator with digitally implemented nonlinearities. These reconfigurable photonic meshes program computationally intensive arbitrary matrix multiplication by setting physical voltages that tune the interference of optically encoded input data propagating through integrated Mach-Zehnder interferometer networks. Here, using our packaged photonic chip, we demonstrate in situ backpropagation for the first time to solve classification tasks and evaluate a new protocol to keep the entire gradient measurement and update of physical device voltages in the analog domain, improving on past theoretical proposals. Our method is made possible by introducing three changes to typical photonic meshes: (1) measurements at optical "grating tap" monitors, (2) bidirectional optical signal propagation automated by fiber switch, and (3) universal generation and readout of optical amplitude and phase. After training, our classification achieves accuracies similar to digital equivalents even in presence of systematic error. Our findings suggest a new training paradigm for photonics-accelerated artificial intelligence based entirely on a physical analog of the popular backpropagation technique.
△ Less
Submitted 17 May, 2022;
originally announced May 2022.
-
MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic
Authors:
Hang Wang,
Zhen Xiang,
David J. Miller,
George Kesidis
Abstract:
Backdoor attacks are an important type of adversarial threat against deep neural network classifiers, wherein test samples from one or more source classes will be (mis)classified to the attacker's target class when a backdoor pattern is embedded. In this paper, we focus on the post-training backdoor defense scenario commonly considered in the literature, where the defender aims to detect whether a…
▽ More
Backdoor attacks are an important type of adversarial threat against deep neural network classifiers, wherein test samples from one or more source classes will be (mis)classified to the attacker's target class when a backdoor pattern is embedded. In this paper, we focus on the post-training backdoor defense scenario commonly considered in the literature, where the defender aims to detect whether a trained classifier was backdoor-attacked without any access to the training set. Many post-training detectors are designed to detect attacks that use either one or a few specific backdoor embedding functions (e.g., patch-replacement or additive attacks). These detectors may fail when the backdoor embedding function used by the attacker (unknown to the defender) is different from the backdoor embedding function assumed by the defender. In contrast, we propose a post-training defense that detects backdoor attacks with arbitrary types of backdoor embeddings, without making any assumptions about the backdoor embedding type. Our detector leverages the influence of the backdoor attack, independent of the backdoor embedding mechanism, on the landscape of the classifier's outputs prior to the softmax layer. For each class, a maximum margin statistic is estimated. Detection inference is then performed by applying an unsupervised anomaly detector to these statistics. Thus, our detector does not need any legitimate clean samples, and can efficiently detect backdoor attacks with arbitrary numbers of source classes. These advantages over several state-of-the-art methods are demonstrated on four datasets, for three different types of backdoor patterns, and for a variety of attack configurations. Finally, we propose a novel, general approach for backdoor mitigation once a detection is made. The mitigation approach was the runner-up at the first IEEE Trojan Removal Competition. The code is online available.
△ Less
Submitted 6 August, 2023; v1 submitted 13 May, 2022;
originally announced May 2022.
-
Bounds on the Coupling Strengths of Communication Channels and Their Information Capacities
Authors:
Zeyu Kuang,
David A. B. Miller,
Owen D. Miller
Abstract:
The concept of optimal communication channels shapes our understanding of wave-based communication. Its analysis, however, always pertains to specific communication-domain geometries, without a general theory of scaling laws or fundamental limits. In this article, we derive shape-independent bounds on the coupling strengths and information capacities of optimal communication channels for any two d…
▽ More
The concept of optimal communication channels shapes our understanding of wave-based communication. Its analysis, however, always pertains to specific communication-domain geometries, without a general theory of scaling laws or fundamental limits. In this article, we derive shape-independent bounds on the coupling strengths and information capacities of optimal communication channels for any two domains that can be separated by a spherical surface. Previous computational experiments have always observed rapid, exponential decay of coupling strengths, but our bounds predict a much slower, sub-exponential optimal decay, and specific source/receiver distributions that can achieve such performance. Our bounds show that domain sizes and configurations, and not domain shapes, are the keys to maximizing the number of non-trivial communication channels and total information capacities. Applicable to general wireless and optical communication systems, our bounds reveal fundamental limits to what is possible through engineering the communication domains of electromagnetic waves.
△ Less
Submitted 10 May, 2022;
originally announced May 2022.
-
Private delegated computations using strong isolation
Authors:
Mathias Brossard,
Guilhem Bryant,
Basma El Gaabouri,
Xinxin Fan,
Alexandre Ferreira,
Edmund Grimley-Evans,
Christopher Haster,
Evan Johnson,
Derek Miller,
Fan Mo,
Dominic P. Mulligan,
Nick Spinale,
Eric van Hensbergen,
Hugo J. M. Vincent,
Shale Xiong
Abstract:
Sensitive computations are now routinely delegated to third-parties. In response, Confidential Computing technologies are being introduced to microprocessors, offering a protected processing environment, which we generically call an isolate, providing confidentiality and integrity guarantees to code and data hosted within -- even in the face of a privileged attacker. Isolates, with an attestation…
▽ More
Sensitive computations are now routinely delegated to third-parties. In response, Confidential Computing technologies are being introduced to microprocessors, offering a protected processing environment, which we generically call an isolate, providing confidentiality and integrity guarantees to code and data hosted within -- even in the face of a privileged attacker. Isolates, with an attestation protocol, permit remote third-parties to establish a trusted "beachhead" containing known code and data on an otherwise untrusted machine. Yet, the rise of these technologies introduces many new problems, including: how to ease provisioning of computations safely into isolates; how to develop distributed systems spanning multiple classes of isolate; and what to do about the billions of "legacy" devices without support for Confidential Computing?
Tackling the problems above, we introduce Veracruz, a framework that eases the design and implementation of complex privacy-preserving, collaborative, delegated computations among a group of mutually mistrusting principals. Veracruz supports multiple isolation technologies and provides a common programming model and attestation protocol across all of them, smoothing deployment of delegated computations over supported technologies. We demonstrate Veracruz in operation, on private in-cloud object detection on encrypted video streaming from a video camera. In addition to supporting hardware-backed isolates -- like AWS Nitro Enclaves and Arm Confidential Computing Architecture Realms -- Veracruz also provides pragmatic "software isolates" on Armv8-A devices without hardware Confidential Computing capability, using the high-assurance seL4 microkernel and our IceCap framework.
△ Less
Submitted 6 May, 2022;
originally announced May 2022.
-
Finite-time bounds on the probabilistic violation of the second law of thermodynamics
Authors:
Harry J. D. Miller,
Martí Perarnau-Llobet
Abstract:
Jarzynski's equality sets a strong bound on the probability of violating the second law of thermodynamics by extracting work beyond the free energy difference. We derive finite-time refinements to this bound for driven systems in contact with a thermal Markovian environment, which can be expressed in terms of the geometric notion of thermodynamic length. We show that finite-time protocols converge…
▽ More
Jarzynski's equality sets a strong bound on the probability of violating the second law of thermodynamics by extracting work beyond the free energy difference. We derive finite-time refinements to this bound for driven systems in contact with a thermal Markovian environment, which can be expressed in terms of the geometric notion of thermodynamic length. We show that finite-time protocols converge to Jarzynski's bound at a rate slower than $1/\sqrtτ$, where $τ$ is the total time of the work-extraction protocol. Our result highlights a new application of minimal dissipation processes and demonstrates a connection between thermodynamic geometry and the higher order statistical properties of work.
△ Less
Submitted 29 November, 2022; v1 submitted 6 May, 2022;
originally announced May 2022.
-
Spatially resolving amplitude and phase of light with a reconfigurable photonic integrated circuit
Authors:
Johannes Bütow,
Jörg S. Eismann,
Maziyar Milanizadeh,
Francesco Morichetti,
Andrea Melloni,
David A. B. Miller,
Peter Banzer
Abstract:
Photonic integrated circuits (PICs) play a pivotal role in many applications. Particularly powerful are circuits based on meshes of reconfigurable Mach-Zehnder interferometers as they enable active processing of light. Various possibilities exist to get light into such circuits. Sampling an electromagnetic field distribution with a carefully designed free-space interface is one of them. Here, a re…
▽ More
Photonic integrated circuits (PICs) play a pivotal role in many applications. Particularly powerful are circuits based on meshes of reconfigurable Mach-Zehnder interferometers as they enable active processing of light. Various possibilities exist to get light into such circuits. Sampling an electromagnetic field distribution with a carefully designed free-space interface is one of them. Here, a reconfigurable PIC is used to optically sample and process free-space beams so as to implement a spatially resolving detector of amplitudes and phases. In order to perform measurements of this kind we develop and experimentally implement a versatile method for the calibration and operation of such integrated photonics based detectors. Our technique works in a wide parameter range, even when running the chip off the design wavelength. Amplitude, phase and polarization sensitive measurements are of enormous importance in modern science and technology, providing a vast range of applications for such detectors.
△ Less
Submitted 20 April, 2022;
originally announced April 2022.
-
Axion Dark Matter
Authors:
C. B. Adams,
N. Aggarwal,
A. Agrawal,
R. Balafendiev,
C. Bartram,
M. Baryakhtar,
H. Bekker,
P. Belov,
K. K. Berggren,
A. Berlin,
C. Boutan,
D. Bowring,
D. Budker,
A. Caldwell,
P. Carenza,
G. Carosi,
R. Cervantes,
S. S. Chakrabarty,
S. Chaudhuri,
T. Y. Chen,
S. Cheong,
A. Chou,
R. T. Co,
J. Conrad,
D. Croon
, et al. (130 additional authors not shown)
Abstract:
Axions are well-motivated dark matter candidates with simple cosmological production mechanisms. They were originally introduced to solve the strong CP problem, but also arise in a wide range of extensions to the Standard Model. This Snowmass white paper summarizes axion phenomenology and outlines next-generation laboratory experiments proposed to detect axion dark matter. There are vibrant synerg…
▽ More
Axions are well-motivated dark matter candidates with simple cosmological production mechanisms. They were originally introduced to solve the strong CP problem, but also arise in a wide range of extensions to the Standard Model. This Snowmass white paper summarizes axion phenomenology and outlines next-generation laboratory experiments proposed to detect axion dark matter. There are vibrant synergies with astrophysical searches and advances in instrumentation including quantum-enabled readout, high-Q resonators and cavities and large high-field magnets. This white paper outlines a clear roadmap to discovery, and shows that the US is well-positioned to be at the forefront of the search for axion dark matter in the coming decade.
△ Less
Submitted 29 March, 2023; v1 submitted 28 March, 2022;
originally announced March 2022.
-
Any Way You Look At It: Semantic Crossview Localization and Map** with LiDAR
Authors:
Ian D. Miller,
Anthony Cowley,
Ravi Konkimalla,
Shreyas S. Shivakumar,
Ty Nguyen,
Trey Smith,
Camillo Jose Taylor,
Vijay Kumar
Abstract:
Currently, GPS is by far the most popular global localization method. However, it is not always reliable or accurate in all environments. SLAM methods enable local state estimation but provide no means of registering the local map to a global one, which can be important for inter-robot collaboration or human interaction. In this work, we present a real-time method for utilizing semantics to global…
▽ More
Currently, GPS is by far the most popular global localization method. However, it is not always reliable or accurate in all environments. SLAM methods enable local state estimation but provide no means of registering the local map to a global one, which can be important for inter-robot collaboration or human interaction. In this work, we present a real-time method for utilizing semantics to globally localize a robot using only egocentric 3D semantically labelled LiDAR and IMU as well as top-down RGB images obtained from satellites or aerial robots. Additionally, as it runs, our method builds a globally registered, semantic map of the environment. We validate our method on KITTI as well as our own challenging datasets, and show better than 10 meter accuracy, a high degree of robustness, and the ability to estimate the scale of a top-down map on the fly if it is initially unknown.
△ Less
Submitted 16 March, 2022;
originally announced March 2022.
-
Self-Supervised Deep Learning to Enhance Breast Cancer Detection on Screening Mammography
Authors:
John D. Miller,
Vignesh A. Arasu,
Albert X. Pu,
Laurie R. Margolies,
Weiva Sieh,
Li Shen
Abstract:
A major limitation in applying deep learning to artificial intelligence (AI) systems is the scarcity of high-quality curated datasets. We investigate strong augmentation based self-supervised learning (SSL) techniques to address this problem. Using breast cancer detection as an example, we first identify a mammogram-specific transformation paradigm and then systematically compare four recent SSL m…
▽ More
A major limitation in applying deep learning to artificial intelligence (AI) systems is the scarcity of high-quality curated datasets. We investigate strong augmentation based self-supervised learning (SSL) techniques to address this problem. Using breast cancer detection as an example, we first identify a mammogram-specific transformation paradigm and then systematically compare four recent SSL methods representing a diversity of approaches. We develop a method to convert a pretrained model from making predictions on uniformly tiled patches to whole images, and an attention-based pooling method that improves the classification performance. We found that the best SSL model substantially outperformed the baseline supervised model. The best SSL model also improved the data efficiency of sample labeling by nearly 4-fold and was highly transferrable from one dataset to another. SSL represents a major breakthrough in computer vision and may help the AI for medical imaging field to shift away from supervised learning and dependency on scarce labels.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
DSOL: A Fast Direct Sparse Odometry Scheme
Authors:
Chao Qu,
Shreyas S. Shivakumar,
Ian D. Miller,
Camillo J. Taylor
Abstract:
In this paper, we describe Direct Sparse Odometry Lite (DSOL), an improved version of Direct Sparse Odometry (DSO). We propose several algorithmic and implementation enhancements which speed up computation by a significant factor (on average 5x) even on resource constrained platforms. The increase in speed allows us to process images at higher frame rates, which in turn provides better results on…
▽ More
In this paper, we describe Direct Sparse Odometry Lite (DSOL), an improved version of Direct Sparse Odometry (DSO). We propose several algorithmic and implementation enhancements which speed up computation by a significant factor (on average 5x) even on resource constrained platforms. The increase in speed allows us to process images at higher frame rates, which in turn provides better results on rapid motions. Our open-source implementation is available at https://github.com/versatran01/dsol.
△ Less
Submitted 15 March, 2022;
originally announced March 2022.
-
What's in the Black Box? The False Negative Mechanisms Inside Object Detectors
Authors:
Dimity Miller,
Peyman Moghadam,
Mark Cox,
Matt Wildie,
Raja Jurdak
Abstract:
In object detection, false negatives arise when a detector fails to detect a target object. To understand why object detectors produce false negatives, we identify five 'false negative mechanisms', where each mechanism describes how a specific component inside the detector architecture failed. Focusing on two-stage and one-stage anchor-box object detector architectures, we introduce a framework fo…
▽ More
In object detection, false negatives arise when a detector fails to detect a target object. To understand why object detectors produce false negatives, we identify five 'false negative mechanisms', where each mechanism describes how a specific component inside the detector architecture failed. Focusing on two-stage and one-stage anchor-box object detector architectures, we introduce a framework for quantifying these false negative mechanisms. Using this framework, we investigate why Faster R-CNN and RetinaNet fail to detect objects in benchmark vision datasets and robotics datasets. We show that a detector's false negative mechanisms differ significantly between computer vision benchmark datasets and robotics deployment scenarios. This has implications for the translation of object detectors developed for benchmark datasets to robotics applications. Code is publicly available at https://github.com/csiro-robotics/fn_mechanisms
△ Less
Submitted 31 July, 2022; v1 submitted 15 March, 2022;
originally announced March 2022.
-
The International Linear Collider: Report to Snowmass 2021
Authors:
Alexander Aryshev,
Ties Behnke,
Mikael Berggren,
James Brau,
Nathaniel Craig,
Ayres Freitas,
Frank Gaede,
Spencer Gessner,
Stefania Gori,
Christophe Grojean,
Sven Heinemeyer,
Daniel Jeans,
Katja Kruger,
Benno List,
Jenny List,
Zhen Liu,
Shinichiro Michizono,
David W. Miller,
Ian Moult,
Hitoshi Murayama,
Tatsuya Nakada,
Emilio Nanni,
Mihoko Nojiri,
Hasan Padamsee,
Maxim Perelstein
, et al. (487 additional authors not shown)
Abstract:
The International Linear Collider (ILC) is on the table now as a new global energy-frontier accelerator laboratory taking data in the 2030s. The ILC addresses key questions for our current understanding of particle physics. It is based on a proven accelerator technology. Its experiments will challenge the Standard Model of particle physics and will provide a new window to look beyond it. This docu…
▽ More
The International Linear Collider (ILC) is on the table now as a new global energy-frontier accelerator laboratory taking data in the 2030s. The ILC addresses key questions for our current understanding of particle physics. It is based on a proven accelerator technology. Its experiments will challenge the Standard Model of particle physics and will provide a new window to look beyond it. This document brings the story of the ILC up to date, emphasizing its strong physics motivation, its readiness for construction, and the opportunity it presents to the US and the global particle physics community.
△ Less
Submitted 16 January, 2023; v1 submitted 14 March, 2022;
originally announced March 2022.
-
Innovations in trigger and data acquisition systems for next-generation physics facilities
Authors:
Rainer Bartoldus,
Catrin Bernius,
David W. Miller
Abstract:
Data-intensive physics facilities are increasingly reliant on heterogeneous and large-scale data processing and computational systems in order to collect, distribute, process, filter, and analyze the ever increasing huge volumes of data being collected. Moreover, these tasks are often performed in hard real-time or quasi real-time processing pipelines that place extreme constraints on various para…
▽ More
Data-intensive physics facilities are increasingly reliant on heterogeneous and large-scale data processing and computational systems in order to collect, distribute, process, filter, and analyze the ever increasing huge volumes of data being collected. Moreover, these tasks are often performed in hard real-time or quasi real-time processing pipelines that place extreme constraints on various parameters and design choices for those systems. Consequently, a large number and variety of challenges are faced to design, construct, and operate such facilities. This is especially true at the energy and intensity frontiers of particle physics where bandwidths of raw data can exceed 100 TB/s of heterogeneous, high-dimensional data sourced from 300M+ individual sensors. Data filtering and compression algorithms deployed at these facilities often operate at the level of 1 part in $10^5$, and once executed, these algorithms drive the data curation process, further highlighting the critical roles that these systems have in the physics impact of those endeavors. This White Paper aims to highlight the challenges that these facilities face in the design of the trigger and data acquisition instrumentation and systems, as well as in their installation, commissioning, integration and operation, and in building the domain knowledge and technical expertise required to do so.
△ Less
Submitted 17 March, 2022; v1 submitted 14 March, 2022;
originally announced March 2022.
-
Ancilla-free implementation of generalized measurements for qubits embedded in a qudit space
Authors:
Laurin E. Fischer,
Daniel Miller,
Francesco Tacchino,
Panagiotis Kl. Barkoutsos,
Daniel J. Egger,
Ivano Tavernelli
Abstract:
Informationally complete (IC) positive operator-valued measures (POVMs) are generalized quantum measurements that offer advantages over the standard computational basis readout of qubits. For instance, IC-POVMs enable efficient extraction of operator expectation values, a crucial step in many quantum algorithms. POVM measurements are typically implemented by coupling one additional ancilla qubit t…
▽ More
Informationally complete (IC) positive operator-valued measures (POVMs) are generalized quantum measurements that offer advantages over the standard computational basis readout of qubits. For instance, IC-POVMs enable efficient extraction of operator expectation values, a crucial step in many quantum algorithms. POVM measurements are typically implemented by coupling one additional ancilla qubit to each logical qubit, thus imposing high demands on the device size and connectivity. Here, we show how to implement a general class of IC-POVMs without ancilla qubits. We exploit the higher-dimensional Hilbert space of a qudit in which qubits are often encoded. POVMs can then be realized by coupling each qubit to two of the available qudit states, followed by a projective measurement. We develop the required control pulse sequences and numerically establish their feasibility for superconducting transmon qubits through pulse-level simulations. Finally, we present an experimental demonstration of a qudit-space POVM measurement on IBM Quantum hardware. This paves the way to making POVM measurements broadly available to quantum computing applications.
△ Less
Submitted 14 March, 2022;
originally announced March 2022.
-
Symmetry Group Equivariant Architectures for Physics
Authors:
Alexander Bogatskiy,
Sanmay Ganguly,
Thomas Kipf,
Risi Kondor,
David W. Miller,
Daniel Murnane,
Jan T. Offermann,
Mariel Pettee,
Phiala Shanahan,
Chase Shimmin,
Savannah Thais
Abstract:
Physical theories grounded in mathematical symmetries are an essential component of our understanding of a wide range of properties of the universe. Similarly, in the domain of machine learning, an awareness of symmetries such as rotation or permutation invariance has driven impressive performance breakthroughs in computer vision, natural language processing, and other important applications. In t…
▽ More
Physical theories grounded in mathematical symmetries are an essential component of our understanding of a wide range of properties of the universe. Similarly, in the domain of machine learning, an awareness of symmetries such as rotation or permutation invariance has driven impressive performance breakthroughs in computer vision, natural language processing, and other important applications. In this report, we argue that both the physics community and the broader machine learning community have much to understand and potentially to gain from a deeper investment in research concerning symmetry group equivariant machine learning architectures. For some applications, the introduction of symmetries into the fundamental structural design can yield models that are more economical (i.e. contain fewer, but more expressive, learned parameters), interpretable (i.e. more explainable or directly mappable to physical quantities), and/or trainable (i.e. more efficient in both data and computational requirements). We discuss various figures of merit for evaluating these models as well as some potential benefits and limitations of these methods for a variety of physics applications. Research and investment into these approaches will lay the foundation for future architectures that are potentially more robust under new computational paradigms and will provide a richer description of the physical systems to which they are applied.
△ Less
Submitted 11 March, 2022;
originally announced March 2022.
-
Hardware-Tailored Diagonalization Circuits
Authors:
Daniel Miller,
Laurin E. Fischer,
Igor O. Sokolov,
Panagiotis Kl. Barkoutsos,
Ivano Tavernelli
Abstract:
A central building block of many quantum algorithms is the diagonalization of Pauli operators. Although it is always possible to construct a quantum circuit that simultaneously diagonalizes a given set of commuting Pauli operators, only resource-efficient circuits are reliably executable on near-term quantum computers. Generic diagonalization circuits can lead to an unaffordable Swap-gate overhead…
▽ More
A central building block of many quantum algorithms is the diagonalization of Pauli operators. Although it is always possible to construct a quantum circuit that simultaneously diagonalizes a given set of commuting Pauli operators, only resource-efficient circuits are reliably executable on near-term quantum computers. Generic diagonalization circuits can lead to an unaffordable Swap-gate overhead on quantum devices with limited hardware connectivity. A common alternative is excluding two-qubit gates, however, this comes at the cost of restricting the class of diagonalizable sets of Pauli operators to tensor product bases (TPBs). In this letter, we introduce a theoretical framework for constructing hardware-tailored (HT) diagonalization circuits. We apply our framework to group the Pauli operators occurring in the decomposition of a given Hamiltonian into jointly-HT-diagonalizable sets. We investigate several classes of popular Hamiltonians and observe that our approach requires a smaller number of measurements than conventional TPB approaches. Finally, we experimentally demonstrate the practical applicability of our technique, which showcases the great potential of our circuits for near-term quantum computing.
△ Less
Submitted 30 August, 2022; v1 submitted 7 March, 2022;
originally announced March 2022.
-
The RATTLE Motion Planning Algorithm for Robust Online Parametric Model Improvement with On-Orbit Validation
Authors:
Keenan Albee,
Monica Ekal,
Brian Coltin,
Rodrigo Ventura,
Richard Linares,
David W. Miller
Abstract:
Certain forms of uncertainty that robotic systems encounter can be explicitly learned within the context of a known model, like parametric model uncertainties such as mass and moments of inertia. Quantifying such parametric uncertainty is important for more accurate prediction of the system behavior, leading to safe and precise task execution. In tandem, providing a form of robustness guarantee ag…
▽ More
Certain forms of uncertainty that robotic systems encounter can be explicitly learned within the context of a known model, like parametric model uncertainties such as mass and moments of inertia. Quantifying such parametric uncertainty is important for more accurate prediction of the system behavior, leading to safe and precise task execution. In tandem, providing a form of robustness guarantee against prevailing uncertainty levels like environmental disturbances and current model knowledge is also desirable. To that end, the authors' previously proposed RATTLE algorithm, a framework for online information-aware motion planning, is outlined and extended to enhance its applicability to real robotic systems. RATTLE provides a clear tradeoff between information-seeking motion and traditional goal-achieving motion and features online-updateable models. Additionally, online-updateable low level control robustness guarantees and a new method for automatic adjustment of information content down to a specified estimation precision is proposed. Results of extensive experimentation in microgravity using the Astrobee robots aboard the International Space Station and practical implementation details are presented, demonstrating RATTLE's capabilities for real-time, robust, online-updateable, and model information-seeking motion planning capabilities under parametric uncertainty.
△ Less
Submitted 3 March, 2022;
originally announced March 2022.
-
On the algebraic solutions of the Painleve-III (D7) equation
Authors:
Robert J. Buckingham,
Peter D. Miller
Abstract:
The D7 degeneration of the Painleve-III equation has solutions that are rational functions of $x^{1/3}$ for certain parameter values. We apply the isomonodromy method to obtain a Riemann-Hilbert representation of these solutions. We demonstrate the utility of this representation by analyzing rigorously the behavior of the solutions in the large parameter limit.
The D7 degeneration of the Painleve-III equation has solutions that are rational functions of $x^{1/3}$ for certain parameter values. We apply the isomonodromy method to obtain a Riemann-Hilbert representation of these solutions. We demonstrate the utility of this representation by analyzing rigorously the behavior of the solutions in the large parameter limit.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
Mitigating the effects of particle background on the Athena Wide-Field Imager
Authors:
Eric D. Miller,
Catherine E. Grant,
Marshall W. Bautz,
Silvano Molendi,
Ralph Kraft,
Paul Nulsen,
Esra Bulbul,
Steven Allen,
David N. Burrows,
Tanja Eraerds,
Valentina Fioretti,
Fabio Gastaldello,
David Hall,
Michael W. J. Hubbard,
Jonathan Keelan,
Norbert Meidinger,
Emanuele Perinati,
Arne Rau,
Dan Wilkins
Abstract:
The Wide Field Imager (WFI) flying on Athena will usher in the next era of studying the hot and energetic Universe. WFI observations of faint, diffuse sources will be limited by uncertainty in the background produced by high-energy particles. These particles produce easily identified "cosmic-ray tracks" along with signals from secondary photons and electrons generated by particle interactions with…
▽ More
The Wide Field Imager (WFI) flying on Athena will usher in the next era of studying the hot and energetic Universe. WFI observations of faint, diffuse sources will be limited by uncertainty in the background produced by high-energy particles. These particles produce easily identified "cosmic-ray tracks" along with signals from secondary photons and electrons generated by particle interactions with the instrument. The signal from these secondaries is identical to the X-rays focused by the optics, and cannot be filtered without also eliminating these precious photons. As part of a larger effort to understand the WFI background, we here present results from a study of background-reduction techniques that exploit the spatial correlation between cosmic-ray particle tracks and secondary events. We use Geant4 simulations to generate a realistic particle background, sort this into simulated WFI frames, and process those frames in a similar way to the expected flight and ground software to produce a WFI observation containing only particle background. The technique under study, Self Anti-Coincidence or SAC, then selectively filters regions of the detector around particle tracks, turning the WFI into its own anti-coincidence detector. We show that SAC is effective at improving the systematic uncertainty for observations of faint, diffuse sources, but at the cost of statistical uncertainty due to a reduction in signal. If sufficient pixel pulse-height information is telemetered to the ground for each frame, then this technique can be applied selectively based on the science goals, providing flexibility without affecting the data quality for other science. The results presented here are relevant for any future silicon-based pixelated X-ray imaging detector, and could allow the WFI and similar instruments to probe to truly faint X-ray surface brightness.
△ Less
Submitted 31 January, 2022;
originally announced February 2022.
-
Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios
Authors:
Zhen Xiang,
David J. Miller,
George Kesidis
Abstract:
Backdoor attacks (BAs) are an emerging threat to deep neural network classifiers. A victim classifier will predict to an attacker-desired target class whenever a test sample is embedded with the same backdoor pattern (BP) that was used to poison the classifier's training set. Detecting whether a classifier is backdoor attacked is not easy in practice, especially when the defender is, e.g., a downs…
▽ More
Backdoor attacks (BAs) are an emerging threat to deep neural network classifiers. A victim classifier will predict to an attacker-desired target class whenever a test sample is embedded with the same backdoor pattern (BP) that was used to poison the classifier's training set. Detecting whether a classifier is backdoor attacked is not easy in practice, especially when the defender is, e.g., a downstream user without access to the classifier's training set. This challenge is addressed here by a reverse-engineering defense (RED), which has been shown to yield state-of-the-art performance in several domains. However, existing REDs are not applicable when there are only {\it two classes} or when {\it multiple attacks} are present. These scenarios are first studied in the current paper, under the practical constraints that the defender neither has access to the classifier's training set nor to supervision from clean reference classifiers trained for the same domain. We propose a detection framework based on BP reverse-engineering and a novel {\it expected transferability} (ET) statistic. We show that our ET statistic is effective {\it using the same detection threshold}, irrespective of the classification domain, the attack configuration, and the BP reverse-engineering algorithm that is used. The excellent performance of our method is demonstrated on six benchmark datasets. Notably, our detection framework is also applicable to multi-class scenarios with multiple attacks. Code is available at https://github.com/zhenxianglance/2ClassBADetection.
△ Less
Submitted 14 March, 2022; v1 submitted 20 January, 2022;
originally announced January 2022.
-
Measurement and simulation of charge diffusion in a small-pixel charge-coupled device
Authors:
Beverly J. LaMarr,
Gregory Y. Prigozhin,
Eric D. Miller,
Carolyn Thayer,
Marshall W. Bautz,
Richard Foster,
Catherine E. Grant,
Andrew Malonis,
Barry E. Burke,
Michael Cooper,
Kevan Donlon,
Christopher Leitz
Abstract:
Future high-resolution imaging X-ray observatories may require detectors with both fine spatial resolution and high quantum efficiency at relatively high X-ray energies (>5keV). A silicon imaging detector meeting these requirements will have a ratio of detector thickness to pixel size of six or more, roughly twice that of legacy imaging sensors. This implies greater diffusion of X-ray charge packe…
▽ More
Future high-resolution imaging X-ray observatories may require detectors with both fine spatial resolution and high quantum efficiency at relatively high X-ray energies (>5keV). A silicon imaging detector meeting these requirements will have a ratio of detector thickness to pixel size of six or more, roughly twice that of legacy imaging sensors. This implies greater diffusion of X-ray charge packets. We investigate consequences for sensor performance, reporting charge diffusion measurements in a fully-depleted, 50um thick, back-illuminated CCD with 8um pixels. We are able to measure the size distributions of charge packets produced by 5.9 keV and 1.25 keV X-rays in this device. We find that individual charge packets exhibit a gaussian spatial distribution, and determine the frequency distribution of event widths for a range of internal electric field strength levels. We find a standard deviation for the largest charge packets, which occur near the entrance window, of 3.9um. We show that the shape of the event width distribution provides a clear indicator of full depletion and infer the relationship between event width and interaction depth. We compare measured width distributions to simulations. We compare traditional, 'sum-above-threshold' algorithms for event amplitude determination to 2D gaussian fitting of events and find better spectroscopic performance with the former for 5.9 keV events and comparable results at 1.25 keV. The reasons for this difference are discussed. We point out the importance of read noise driven detection thresholds in spectral resolution, and note that the derived read noise requirements for mission concepts such as AXIS and Lynx may be too lax to meet spectral resolution requirements. While we report measurements made with a CCD, we note that they have implications for the performance of high aspect-ratio silicon active pixel sensors as well.
△ Less
Submitted 19 January, 2022;
originally announced January 2022.
-
Broader Universality of Rogue Waves of Infinite Order
Authors:
Deniz Bilman,
Peter D. Miller
Abstract:
We show that the same special solution of the focusing nonlinear Schrödinger equation that has been shown to arise in a certain near-field/large-order limit from soliton and Peregrine-like rogue wave solutions actually arises universally from an arbitrary background solution when subjected to a sequence of iterated Bäcklund transformations.
We show that the same special solution of the focusing nonlinear Schrödinger equation that has been shown to arise in a certain near-field/large-order limit from soliton and Peregrine-like rogue wave solutions actually arises universally from an arbitrary background solution when subjected to a sequence of iterated Bäcklund transformations.
△ Less
Submitted 30 December, 2021;
originally announced December 2021.
-
Multibeam Free Space Optics Receiver Enabled by a Programmable Photonic Mesh
Authors:
Maziyar Milanizadeh,
SeyedMohammad SeyedinNavadeh,
Francesco Zanetto,
Vittorio Grimaldi,
Christian De Vita,
Charalambos Klitis,
Marc Sorel,
Giorgio Ferrari,
David A. B. Miller,
Andrea Melloni,
Francesco Morichetti
Abstract:
Free-space optics (FSO) is an attractive technology to meet the ever-growing demand for wireless bandwidth in next generation networks. To increase the spectral efficiency of FSO links, transmission over spatial division multiplexing (SDM) can be exploited, where orthogonal light beams have to be shaped according to suitable amplitude, phase, and polarization profiles. In this work, we show that a…
▽ More
Free-space optics (FSO) is an attractive technology to meet the ever-growing demand for wireless bandwidth in next generation networks. To increase the spectral efficiency of FSO links, transmission over spatial division multiplexing (SDM) can be exploited, where orthogonal light beams have to be shaped according to suitable amplitude, phase, and polarization profiles. In this work, we show that a programmable photonic circuits, consisting of a silicon photonic mesh of tunable Mach-Zehnder Interferometers (MZIs) can be used as an adaptive multibeam receiver for a FSO communication link. The circuit can self-configure to simultaneously receive and separate, with negligible mutual crosstalk, signals carried by orthogonal FSO beams sharing the same wavelength and polarization. This feature is demonstrated on signal pairs either arriving at the receiver from orthogonal directions (direction-diversity) or being shaped according to different orthogonal spatial modes (mode-diversity), even in the presence of some mixing during propagation. The performance of programmable mesh as an adaptive multibeam receiver is assessed by means of data channel transmission at 10 Gbit/s a wavelength of 1550 nm, but the optical bandwidth of the receiver (>40 nm) allows its use at much higher data rates as well as in wavelength-division multiplexing SDM communication links.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
Fundamental limits to multi-functional and tunable nanophotonic response
Authors:
Hyungki Shim,
Zeyu Kuang,
Zin Lin,
Owen D. Miller
Abstract:
Tunable and multi-functional nanophotonic devices are used for applications from beam steering to sensing. Yet little is understood about fundamental limits to their functionality. The difficulty lies with the fact that it is a single structure that must exhibit optimal response over multiple scenarios. In this article, we present a general theoretical framework for understanding and computing fun…
▽ More
Tunable and multi-functional nanophotonic devices are used for applications from beam steering to sensing. Yet little is understood about fundamental limits to their functionality. The difficulty lies with the fact that it is a single structure that must exhibit optimal response over multiple scenarios. In this article, we present a general theoretical framework for understanding and computing fundamental limits to multi-functional nanophotonic response. Building from rapid recent advances in bounds to light-matter interactions, we show that after rewriting the design problems in terms of polarization fields, the introduction of suitable cross-correlation constraints imposes the crucial "single-structure" criteria. We demonstrate the utility of this approach for two applications: reflectivity contrast for optical sensing, and maximum efficiency for optical beam switching. Our approach generalizes to any active or multi-functional design in linear optics.
△ Less
Submitted 20 December, 2021;
originally announced December 2021.
-
Online Information-Aware Motion Planning with Inertial Parameter Learning for Robotic Free-Flyers
Authors:
Monica Ekal,
Keenan Albee,
Brian Coltin,
Rodrigo Ventura,
Richard Linares,
David W. Miller
Abstract:
Space free-flyers like the Astrobee robots currently operating aboard the International Space Station must operate with inherent system uncertainties. Parametric uncertainties like mass and moment of inertia are especially important to quantify in these safety-critical space systems and can change in scenarios such as on-orbit cargo movement, where unknown grappled payloads significantly change th…
▽ More
Space free-flyers like the Astrobee robots currently operating aboard the International Space Station must operate with inherent system uncertainties. Parametric uncertainties like mass and moment of inertia are especially important to quantify in these safety-critical space systems and can change in scenarios such as on-orbit cargo movement, where unknown grappled payloads significantly change the system dynamics. Cautiously learning these uncertainties en route can potentially avoid time- and fuel-consuming pure system identification maneuvers. Recognizing this, this work proposes RATTLE, an online information-aware motion planning algorithm that explicitly weights parametric model-learning coupled with real-time replanning capability that can take advantage of improved system models. The method consists of a two-tiered (global and local) planner, a low-level model predictive controller, and an online parameter estimator that produces estimates of the robot's inertial properties for more informed control and replanning on-the-fly; all levels of the planning and control feature online update-able models. Simulation results of RATTLE for the Astrobee free-flyer grappling an uncertain payload are presented alongside results of a hardware demonstration showcasing the ability to explicitly encourage model parametric learning while achieving otherwise useful motion.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks
Authors:
Xi Li,
Zhen Xiang,
David J. Miller,
George Kesidis
Abstract:
Backdoor (Trojan) attacks are emerging threats against deep neural networks (DNN). A DNN being attacked will predict to an attacker-desired target class whenever a test sample from any source class is embedded with a backdoor pattern; while correctly classifying clean (attack-free) test samples. Existing backdoor defenses have shown success in detecting whether a DNN is attacked and in reverse-eng…
▽ More
Backdoor (Trojan) attacks are emerging threats against deep neural networks (DNN). A DNN being attacked will predict to an attacker-desired target class whenever a test sample from any source class is embedded with a backdoor pattern; while correctly classifying clean (attack-free) test samples. Existing backdoor defenses have shown success in detecting whether a DNN is attacked and in reverse-engineering the backdoor pattern in a "post-training" regime: the defender has access to the DNN to be inspected and a small, clean dataset collected independently, but has no access to the (possibly poisoned) training set of the DNN. However, these defenses neither catch culprits in the act of triggering the backdoor map**, nor mitigate the backdoor attack at test-time. In this paper, we propose an "in-flight" defense against backdoor attacks on image classification that 1) detects use of a backdoor trigger at test-time; and 2) infers the class of origin (source class) for a detected trigger example. The effectiveness of our defense is demonstrated experimentally against different strong backdoor attacks.
△ Less
Submitted 6 December, 2021;
originally announced December 2021.
-
Thermodynamic length and work optimisation for Gaussian quantum states
Authors:
Mohammad Mehboudi,
Harry J. D. Miller
Abstract:
Constructing optimal thermodynamic processes in quantum systems relies on managing the balance between the average excess work and its stochastic fluctuations. Recently it has been shown that two different quantum generalisations of thermodynamic length can be utilised to determine protocols with either minimal excess work or minimal work variance. These lengths measure the distance between points…
▽ More
Constructing optimal thermodynamic processes in quantum systems relies on managing the balance between the average excess work and its stochastic fluctuations. Recently it has been shown that two different quantum generalisations of thermodynamic length can be utilised to determine protocols with either minimal excess work or minimal work variance. These lengths measure the distance between points on a manifold of control parameters, and optimal protocols are achieved by following the relevant geodesic paths given some fixed boundary conditions. Here we explore this problem in the context of Gaussian quantum states that are weakly coupled to an environment and derive general expressions for these two forms of thermodynamic length. We then use this to compute optimal thermodynamic protocols for various examples of externally driven Gaussian systems with multiple control parameters.
△ Less
Submitted 3 December, 2021;
originally announced December 2021.
-
Broadband solenoidal haloscope for terahertz axion detection
Authors:
Jesse Liu,
Kristin Dona,
Gabe Hoshino,
Stefan Knirck,
Noah Kurinsky,
Matthew Malaker,
David W. Miller,
Andrew Sonnenschein,
Mohamed H. Awida,
Peter S. Barry,
Karl K. Berggren,
Daniel Bowring,
Gianpaolo Carosi,
Clarence Chang,
Aaron Chou,
Rakshya Khatiwada,
Samantha Lewis,
Juliang Li,
Sae Woo Nam,
Omid Noroozian,
Tony X. Zhou
Abstract:
We introduce the Broadband Reflector Experiment for Axion Detection (BREAD) conceptual design and science program. This haloscope plans to search for bosonic dark matter across the [10$^{-3}$, 1] eV ([0.24, 240] THz) mass range. BREAD proposes a cylindrical metal barrel to convert dark matter into photons, which a novel parabolic reflector design focuses onto a photosensor. This unique geometry en…
▽ More
We introduce the Broadband Reflector Experiment for Axion Detection (BREAD) conceptual design and science program. This haloscope plans to search for bosonic dark matter across the [10$^{-3}$, 1] eV ([0.24, 240] THz) mass range. BREAD proposes a cylindrical metal barrel to convert dark matter into photons, which a novel parabolic reflector design focuses onto a photosensor. This unique geometry enables enclosure in standard cryostats and high-field solenoids, overcoming limitations of current dish antennas. A pilot 0.7 m$^{2}$ barrel experiment planned at Fermilab is projected to surpass existing dark photon coupling constraints by over a decade with one-day runtime. Axion sensitivity requires $<10^{-20}$ W/$\sqrt{\textrm{Hz}}$ sensor noise equivalent power with a 10 T solenoid and 10 m$^{2}$ barrel. We project BREAD sensitivity for various sensor technologies and discuss future prospects.
△ Less
Submitted 24 March, 2022; v1 submitted 23 November, 2021;
originally announced November 2021.
-
Improved Constraints on Effective Top Quark Interactions using Edge Convolution Networks
Authors:
Oliver Atkinson,
Akanksha Bhardwaj,
Stephen Brown,
Christoph Englert,
David J. Miller,
Panagiotis Stylianou
Abstract:
We explore the potential of Graph Neural Networks (GNNs) to improve the performance of high-dimensional effective field theory parameter fits to collider data beyond traditional rectangular cut-based differential distribution analyses. In this study, we focus on a SMEFT analysis of $pp \to t\bar t$ production, including top decays, where the linear effective field deformation is parametrised by th…
▽ More
We explore the potential of Graph Neural Networks (GNNs) to improve the performance of high-dimensional effective field theory parameter fits to collider data beyond traditional rectangular cut-based differential distribution analyses. In this study, we focus on a SMEFT analysis of $pp \to t\bar t$ production, including top decays, where the linear effective field deformation is parametrised by thirteen independent Wilson coefficients. The application of GNNs allows us to condense the multidimensional phase space information available for the discrimination of BSM effects from the SM expectation by considering all available final state correlations directly. The number of contributing new physics couplings very quickly leads to statistical limitations when the GNN output is directly employed as an EFT discrimination tool. However, a selection based on minimising the SM contribution enhances the fit's sensitivity when reflected as a (non-rectangular) selection on the inclusive data samples that are typically employed when looking for non-resonant deviations from the SM by means of differential distributions.
△ Less
Submitted 28 April, 2022; v1 submitted 2 November, 2021;
originally announced November 2021.
-
IACHEC 2020/2021 Pandemic Report
Authors:
K. K. Madsen,
V. Burwitz,
K. Forster,
C. E. Grant,
M. Guainazzi,
V. Kashyap,
H. L. Marshall,
E. D. Miller,
L. Natalucci,
P. P. Plucinsky,
Y. Terada
Abstract:
In this report we summarize the activities of the International Astronomical Consortium for High Energy Calibration (IACHEC) and the work done since the last in-person meeting in Japan (Shonan Village Center), May 2019, through two virtual meetings that were held in November 2020 and May 2021. The on-line only meetings divided the contents of the usual in-person workshop between mission updates an…
▽ More
In this report we summarize the activities of the International Astronomical Consortium for High Energy Calibration (IACHEC) and the work done since the last in-person meeting in Japan (Shonan Village Center), May 2019, through two virtual meetings that were held in November 2020 and May 2021. The on-line only meetings divided the contents of the usual in-person workshop between mission updates and working group updates. The November meeting was dedicated to mission calibration updates and the current status of the cross-calibration between NuSTAR, Swift, and NICER, which frequently join together in observations of bright transients, and a review of the XMM-Newton and Chandra cross-calibration. Results between \nustar\ and \swift\ overall show good agreement, but issues persist in the overlap region 3--5 keV for bright source with large dust scattering halos. The NICER cross-calibration is still progressing and evolving, while for the XMM-Newton and Chandra cross-calibration systematic differences both in the absolute flux and spectral shape determination still exists on different classes of sources. The meeting in May was focused on the Working Group progress and reports summarized here.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Detecting Backdoor Attacks Against Point Cloud Classifiers
Authors:
Zhen Xiang,
David J. Miller,
Siheng Chen,
Xi Li,
George Kesidis
Abstract:
Backdoor attacks (BA) are an emerging threat to deep neural network classifiers. A classifier being attacked will predict to the attacker's target class when a test sample from a source class is embedded with the backdoor pattern (BP). Recently, the first BA against point cloud (PC) classifiers was proposed, creating new threats to many important applications including autonomous driving. Such PC…
▽ More
Backdoor attacks (BA) are an emerging threat to deep neural network classifiers. A classifier being attacked will predict to the attacker's target class when a test sample from a source class is embedded with the backdoor pattern (BP). Recently, the first BA against point cloud (PC) classifiers was proposed, creating new threats to many important applications including autonomous driving. Such PC BAs are not detectable by existing BA defenses due to their special BP embedding mechanism. In this paper, we propose a reverse-engineering defense that infers whether a PC classifier is backdoor attacked, without access to its training set or to any clean classifiers for reference. The effectiveness of our defense is demonstrated on the benchmark ModeNet40 dataset for PCs.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
The Ultramassive White Dwarfs of the Alpha Persei Cluster
Authors:
David R. Miller,
Ilaria Caiazzo,
Jeremy Heyl,
Harvey Richer
Abstract:
We searched through the entire Gaia EDR3 candidate white dwarf catalogue for stars with proper motions and positions that are consistent with the stars having escaped from the Alpha Persei cluster within the past 81~Myr, the age of the cluster. In this search we found five candidate white dwarf escapees from Alpha Persei and obtained spectra for all five. We confirm that three are massive white dw…
▽ More
We searched through the entire Gaia EDR3 candidate white dwarf catalogue for stars with proper motions and positions that are consistent with the stars having escaped from the Alpha Persei cluster within the past 81~Myr, the age of the cluster. In this search we found five candidate white dwarf escapees from Alpha Persei and obtained spectra for all five. We confirm that three are massive white dwarfs sufficiently young to have originated in the cluster. All three are more massive than any white dwarf previously associated with a cluster using Gaia astrometry, and possess some of the most massive progenitors. In particular, the white dwarf Gaia~EDR3~4395978097863572, which lies within 25~pc of the cluster centre, has a mass of about 1.20 solar masses and evolved from an 8.5 solar-mass star, pushing the upper limit for white dwarf formation from a single massive star, while still leaving a substantial gap between the resulting white dwarf mass and the Chandrasekhar mass.
△ Less
Submitted 31 March, 2022; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Reconstructing Nearby Young Clusters with Gaia EDR3
Authors:
Jeremy Heyl,
Ilaria Caiazzo,
Harvey Richer,
David R. Miller
Abstract:
We searched through a seven-million cubic-parsec volume surrounding each of the four nearest young open clusters with ages from 40 to 80 Myr to identify both the current and past members of the clusters within the Gaia EDR3 dataset. We find over 1,700 current cluster members and over 1,200 candidate escapees. Many of these candidates lie well in front and behind the cluster from our point of view,…
▽ More
We searched through a seven-million cubic-parsec volume surrounding each of the four nearest young open clusters with ages from 40 to 80 Myr to identify both the current and past members of the clusters within the Gaia EDR3 dataset. We find over 1,700 current cluster members and over 1,200 candidate escapees. Many of these candidates lie well in front and behind the cluster from our point of view, so formerly they were considered cluster members, but their parallaxes put them more than 10 pc from the centre of the cluster today. We found two candidate high-mass white dwarfs that may have escaped from the alpha Persei cluster and several candidate main-sequence-white-dwarf binaries associated with the younger clusters, NGC 2451A, IC 2391 and IC 2602. All of these objects require spectroscopic confirmation. Using these samples of escapee candidates, we develop and implement a novel technique to determine the ages of these clusters and the Pleiades using kinematics with typical uncertainties of $5-7$ Myr. For all five clusters, this kinematic age is younger than the age estimated with isochrones but within the uncertainties of the isochrone fitting. We find for the clusters that travel far from the Galactic plane (the Pleiades, NGC 2451A and IC 2602), the formation of the cluster coincides with when the cluster was in the Galactic plane within a few Myr, supporting these age determinations.
△ Less
Submitted 7 October, 2021;
originally announced October 2021.
-
Model Reference Adaptive Control with Linear-like Closed-loop Behavior
Authors:
Mohamad T. Shahab,
Daniel E. Miller
Abstract:
It is typically proven in adaptive control that asymptotic stabilization and tracking holds, and that at best a bounded-noise bounded-state property is proven. Recently, it has been shown in both the pole-placement control and the $d$-step ahead control settings that if, as part of the adaptive controller, a parameter estimator based on the original projection algorithm is used and the parameter e…
▽ More
It is typically proven in adaptive control that asymptotic stabilization and tracking holds, and that at best a bounded-noise bounded-state property is proven. Recently, it has been shown in both the pole-placement control and the $d$-step ahead control settings that if, as part of the adaptive controller, a parameter estimator based on the original projection algorithm is used and the parameter estimates are restricted to a convex set, then the closed-loop system experiences linear-like behavior: exponential stability, a bounded gain on the noise in every $p$-norm, and a convolution bound on the exogenous inputs; this can be leveraged to provide tolerance to unmodelled dynamics and plant parameter time-variation. In this paper, we extend the approach to the more general Model Reference Adaptive Control (MRAC) problem and demonstrate that we achieve the same desirable linear-like closed-loop properties.
△ Less
Submitted 2 October, 2021; v1 submitted 22 September, 2021;
originally announced September 2021.
-
Backdoor Attack and Defense for Deep Regression
Authors:
Xi Li,
George Kesidis,
David J. Miller,
Vladimir Lucic
Abstract:
We demonstrate a backdoor attack on a deep neural network used for regression. The backdoor attack is localized based on training-set data poisoning wherein the mislabeled samples are surrounded by correctly labeled ones. We demonstrate how such localization is necessary for attack success. We also study the performance of a backdoor defense using gradient-based discovery of local error maximizers…
▽ More
We demonstrate a backdoor attack on a deep neural network used for regression. The backdoor attack is localized based on training-set data poisoning wherein the mislabeled samples are surrounded by correctly labeled ones. We demonstrate how such localization is necessary for attack success. We also study the performance of a backdoor defense using gradient-based discovery of local error maximizers. Local error maximizers which are associated with significant (interpolation) error, and are proximal to many training samples, are suspicious. This method is also used to accurately train for deep regression in the first place by active (deep) learning leveraging an "oracle" capable of providing real-valued supervision (a regression target) for samples. Such oracles, including traditional numerical solvers of PDEs or SDEs using finite difference or Monte Carlo approximations, are far more computationally costly compared to deep regression.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Mechanisms for spontaneous symmetry breaking in develo** visual cortex
Authors:
Francesco Fumarola,
Bettina Hein,
Kenneth D. Miller
Abstract:
For the brain to recognize local orientations within images, neurons must spontaneously break the translation and rotation symmetry of their response functions -- an archetypal example of unsupervised learning. The dominant framework for unsupervised learning in biology is Hebb's principle, but how Hebbian learning could break such symmetries is a longstanding biophysical riddle. Theoretical studi…
▽ More
For the brain to recognize local orientations within images, neurons must spontaneously break the translation and rotation symmetry of their response functions -- an archetypal example of unsupervised learning. The dominant framework for unsupervised learning in biology is Hebb's principle, but how Hebbian learning could break such symmetries is a longstanding biophysical riddle. Theoretical studies agree that this should require inputs to visual cortex to invert the relative magnitude of their correlations at long distances. Empirical measurements have searched in vain for such an inversion, and report the opposite to be true. We formally approach the question through the hermitianization of a multi-layer model, which maps it into a problem of zero-temperature phase transitions. In the emerging phase diagram, both symmetries break spontaneously as long as (1) recurrent interactions are sufficiently long-range and (2) Hebbian competition is duly accounted for. The relevant mechanism for symmetry breaking is competition among connections sprouting from the same afferent cell. Such competition, and not the structure of the inputs, is capable of triggering the broken-symmetry phase required by image processing. We provide analytic predictions on the relative magnitudes of the relevant length-scales needed for this novel mechanism to occur. These results reconcile experimental observations to the Hebbian paradigm, shed light on a new mechanism for visual cortex development, and contribute to our growing understanding of the relationship between learning and symmetry breaking.
△ Less
Submitted 5 September, 2021;
originally announced September 2021.
-
The Fundamental Equilibrium Equation For Gaseous Stars And The Tolman-Oppenheimer-Volkoff Equation -- Derivations And Applications With Emphasis On Optimisational-Variational Methods
Authors:
Steven D Miller
Abstract:
Stars are essentially gravitationally stabilised thermonuclear reactors in hydrostatic equilibrium. The fundamental differential equation for all Newtonian gaseous stars in equilibrium is \begin{align} \frac{dp(r)}{dr}=-\frac{\mathscr{G}\mathcal{M}(r)ρ(r)}{r^{2}}\nonumber \end{align} where $p(r),ρ(r)$ are the pressure, density at radius $r$ and $\mathcal{M}(r)$ is the mass contained within a shell…
▽ More
Stars are essentially gravitationally stabilised thermonuclear reactors in hydrostatic equilibrium. The fundamental differential equation for all Newtonian gaseous stars in equilibrium is \begin{align} \frac{dp(r)}{dr}=-\frac{\mathscr{G}\mathcal{M}(r)ρ(r)}{r^{2}}\nonumber \end{align} where $p(r),ρ(r)$ are the pressure, density at radius $r$ and $\mathcal{M}(r)$ is the mass contained within a shell of radius $r$ given by $\mathcal{M}(r)=\int_{0}^{r}4π\overline{r}^{2} ρ(\overline{r})d\overline{r}$, and $\mathscr{G}$ is Newton's constant. This simple but crucial differential equation for the pressure gradient within any star, underpins much of astrophysical theory and it can derived by various methods:via a simple heuristic argument; via the Euler-Poisson equations for a self-gravitating fluid/gas; via a variational method by taking the 1st variation of the sum of the thermal and gravitational energies of the star; via the 2nd variation of the Massiue thermodynamic functional for a self-gravitating isothermal perfect-gas sphere; from conservation of the virial tensor; as the non-relativistic limit of the Tolman-Oppenheimer-Volkoff equation (TOVE). The TOVE for equilibrium of relativistic stars in general relativity can in turn be derived by various methods: from the energy-momentum conservation constraint on the Einstein equations applied to a spherically symmetric perfect fluid/gas; via a constrained optimization method on the mass and nucleon number; via a maximum entropy variational method for a sphere of self-gravitating perfect fluid/gas or radiation. An overview is given of all derivations with emphasis on variational methods. Many important applications and astrophysical consequences of the Newtonian equilibrium equation are also reviewed.
△ Less
Submitted 5 September, 2021;
originally announced September 2021.
-
A Survey of the Proof-Theoretic Foundations of Logic Programming
Authors:
Dale Miller
Abstract:
Several formal systems, such as resolution and minimal model semantics, provide a framework for logic programming. In this paper, we will survey the use of structural proof theory as an alternative foundation. Researchers have been using this foundation for the past 35 years to elevate logic programming from its roots in first-order classical logic into higher-order versions of intuitionistic and…
▽ More
Several formal systems, such as resolution and minimal model semantics, provide a framework for logic programming. In this paper, we will survey the use of structural proof theory as an alternative foundation. Researchers have been using this foundation for the past 35 years to elevate logic programming from its roots in first-order classical logic into higher-order versions of intuitionistic and linear logic. These more expressive logic programming languages allow for capturing stateful computations and rich forms of abstractions, including higher-order programming, modularity, and abstract data types. Term-level bindings are another kind of abstraction, and these are given an elegant and direct treatment within both proof theory and these extended logic programming languages. Logic programming has also inspired new results in proof theory, such as those involving polarity and focused proofs. These recent results provide a high-level means for presenting the differences between forward-chaining and backward-chaining style inferences. Anchoring logic programming in proof theory has also helped identify its connections and differences with functional programming, deductive databases, and model checking.
△ Less
Submitted 30 October, 2021; v1 submitted 3 September, 2021;
originally announced September 2021.
-
Quantum state tomography of molecules by ultrafast diffraction
Authors:
Ming Zhang,
Shuqiao Zhang,
Yanwei Xiong,
Hankai Zhang,
Anatoly A. Ischenko,
Oriol Vendrell,
Xiaolong Dong,
Xiangxu Mu,
Martin Centurion,
Haitan Xu,
R. J. Dwayne Miller,
Zheng Li
Abstract:
Ultrafast electron diffraction and time-resolved serial crystallography are the basis of the ongoing revolution in capturing at the atomic level of detail the structural dynamics of molecules. However, most experiments employ the classical "ball-and-stick" depictions, and the information of molecular quantum states, such as the density matrix, is missing. Here, we introduce a framework for the pre…
▽ More
Ultrafast electron diffraction and time-resolved serial crystallography are the basis of the ongoing revolution in capturing at the atomic level of detail the structural dynamics of molecules. However, most experiments employ the classical "ball-and-stick" depictions, and the information of molecular quantum states, such as the density matrix, is missing. Here, we introduce a framework for the preparation and ultrafast coherent diffraction from rotational wave packets of molecules, and we establish a new variant of quantum state tomography for ultrafast electron diffraction to characterize the molecular quantum states. The ability to reconstruct the density matrix of molecules of arbitrary degrees of freedom will provide us with an unprecedentedly clear view of the quantum states of molecules, and enable the visualization of effects dictated by the quantum dynamics of molecules.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Robust and Active Learning for Deep Neural Network Regression
Authors:
Xi Li,
George Kesidis,
David J. Miller,
Maxime Bergeron,
Ryan Ferguson,
Vladimir Lucic
Abstract:
We describe a gradient-based method to discover local error maximizers of a deep neural network (DNN) used for regression, assuming the availability of an "oracle" capable of providing real-valued supervision (a regression target) for samples. For example, the oracle could be a numerical solver which, operationally, is much slower than the DNN. Given a discovered set of local error maximizers, the…
▽ More
We describe a gradient-based method to discover local error maximizers of a deep neural network (DNN) used for regression, assuming the availability of an "oracle" capable of providing real-valued supervision (a regression target) for samples. For example, the oracle could be a numerical solver which, operationally, is much slower than the DNN. Given a discovered set of local error maximizers, the DNN is either fine-tuned or retrained in the manner of active learning.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Readability Research: An Interdisciplinary Approach
Authors:
Sofie Beier,
Sam Berlow,
Esat Boucaud,
Zoya Bylinskii,
Tianyuan Cai,
Jenae Cohn,
Kathy Crowley,
Stephanie L. Day,
Tilman Dingler,
Jonathan Dobres,
Jennifer Healey,
Rajiv Jain,
Marjorie Jordan,
Bernard Kerr,
Qisheng Li,
Dave B. Miller,
Susanne Nobles,
Alexandra Papoutsaki,
**g Qian,
Tina Rezvanian,
Shelley Rodrigo,
Ben D. Sawyer,
Shannon M. Sheppard,
Bram Stein,
Rick Treitman
, et al. (3 additional authors not shown)
Abstract:
Readability is on the cusp of a revolution. Fixed text is becoming fluid as a proliferation of digital reading devices rewrite what a document can do. As past constraints make way for more flexible opportunities, there is great need to understand how reading formats can be tuned to the situation and the individual. We aim to provide a firm foundation for readability research, a comprehensive frame…
▽ More
Readability is on the cusp of a revolution. Fixed text is becoming fluid as a proliferation of digital reading devices rewrite what a document can do. As past constraints make way for more flexible opportunities, there is great need to understand how reading formats can be tuned to the situation and the individual. We aim to provide a firm foundation for readability research, a comprehensive framework for modern, multi-disciplinary readability research. Readability refers to aspects of visual information design which impact information flow from the page to the reader. Readability can be enhanced by changes to the set of typographical characteristics of a text. These aspects can be modified on-demand, instantly improving the ease with which a reader can process and derive meaning from text. We call on a multi-disciplinary research community to take up these challenges to elevate reading outcomes and provide the tools to do so effectively.
△ Less
Submitted 20 July, 2021;
originally announced July 2021.
-
A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers
Authors:
Xi Li,
David J. Miller,
Zhen Xiang,
George Kesidis
Abstract:
Data Poisoning (DP) is an effective attack that causes trained classifiers to misclassify their inputs. DP attacks significantly degrade a classifier's accuracy by covertly injecting attack samples into the training set. Broadly applicable to different classifier structures, without strong assumptions about the attacker, an {\it unsupervised} Bayesian Information Criterion (BIC)-based mixture mode…
▽ More
Data Poisoning (DP) is an effective attack that causes trained classifiers to misclassify their inputs. DP attacks significantly degrade a classifier's accuracy by covertly injecting attack samples into the training set. Broadly applicable to different classifier structures, without strong assumptions about the attacker, an {\it unsupervised} Bayesian Information Criterion (BIC)-based mixture model defense against "error generic" DP attacks is herein proposed that: 1) addresses the most challenging {\it embedded} DP scenario wherein, if DP is present, the poisoned samples are an {\it a priori} unknown subset of the training set, and with no clean validation set available; 2) applies a mixture model both to well-fit potentially multi-modal class distributions and to capture poisoned samples within a small subset of the mixture components; 3) jointly identifies poisoned components and samples by minimizing the BIC cost defined over the whole training set, with the identified poisoned data removed prior to classifier training. Our experimental results, for various classifier structures and benchmark datasets, demonstrate the effectiveness and universality of our defense under strong DP attacks, as well as its superiority over other works.
△ Less
Submitted 12 May, 2022; v1 submitted 27 May, 2021;
originally announced May 2021.