-
Observation of the Electromagnetic Dalitz Transition $h_c \rightarrow e^+e^-η_c$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
S. Ahmed,
M. Albrecht,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
X. H. Bai,
Y. Bai,
O. Bakina,
R. Baldini Ferroli,
I. Balossino,
Y. Ban,
K. Begzsuren,
N. Berger,
M. Bertani,
D. Bettoni,
F. Bianchi,
J. Bloms,
A. Bortone,
I. Boyko,
R. A. Briere
, et al. (495 additional authors not shown)
Abstract:
Using $(27.12\pm 0.14)\times10^8$ $ψ(3686)$ decays and data samples of $e^+e^-$ collisions with $\sqrt{s}$ from 4.130 to 4.780~GeV collected with the BESIII detector, we report the first observation of the electromagnetic Dalitz transition $h_c\to e^+e^-η_c$ with a statistical significance of $5.4σ$. We measure the ratio of the branching fractions…
▽ More
Using $(27.12\pm 0.14)\times10^8$ $ψ(3686)$ decays and data samples of $e^+e^-$ collisions with $\sqrt{s}$ from 4.130 to 4.780~GeV collected with the BESIII detector, we report the first observation of the electromagnetic Dalitz transition $h_c\to e^+e^-η_c$ with a statistical significance of $5.4σ$. We measure the ratio of the branching fractions $\frac{\mathcal{B}(h_c\rightarrow e^+e^-η_c)}{\mathcal{B}(h_c\rightarrow γη_c)}$ separately for the $h_c$ samples produced via $ψ(3686)\toπ^0h_c$ and $e^+e^-\toπ^+π^-h_c$. The average ratio is determined to be $(0.59\pm0.10(\text{stat.})\pm0.04(\text{syst.}))\%$, where the uncertainty includes both statistical and systematic components.
△ Less
Submitted 2 July, 2024; v1 submitted 28 June, 2024;
originally announced July 2024.
-
The intermittent vibration observed by Reynolds in a cylindrical tube
Authors:
Zuwen Qian
Abstract:
In a cylindrical tube filled with incompressible fluid, the variable parameter method is applied to solve the vorticity motion equation, and the obtained results are substituted into the Poisson equation satisfied by the energy density. The static distribution of energy density in the tube and the energy density of the flowing fluid after a certain spatial sampling interval are obtained. Further n…
▽ More
In a cylindrical tube filled with incompressible fluid, the variable parameter method is applied to solve the vorticity motion equation, and the obtained results are substituted into the Poisson equation satisfied by the energy density. The static distribution of energy density in the tube and the energy density of the flowing fluid after a certain spatial sampling interval are obtained. Further numerical calculations are conducted on the energy density of the flowing fluid, the results show that the intermittent vibration observed by Reynolds 140 years ago can only be obtained with the appropriate spatial sampling interval. The energy density in the tube is proportional to to , where N is an integer It tends to infinity with increasing N.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
AnyTrans: Translate AnyText in the Image with Large Scale Models
Authors:
Zhipeng Qian,
Pei Zhang,
Baosong Yang,
Kai Fan,
Yiwei Ma,
Derek F. Wong,
Xiaoshuai Sun,
Rongrong Ji
Abstract:
This paper introduces AnyTrans, an all-encompassing framework for the task-Translate AnyText in the Image (TATI), which includes multilingual text translation and text fusion within images. Our framework leverages the strengths of large-scale models, such as Large Language Models (LLMs) and text-guided diffusion models, to incorporate contextual cues from both textual and visual elements during tr…
▽ More
This paper introduces AnyTrans, an all-encompassing framework for the task-Translate AnyText in the Image (TATI), which includes multilingual text translation and text fusion within images. Our framework leverages the strengths of large-scale models, such as Large Language Models (LLMs) and text-guided diffusion models, to incorporate contextual cues from both textual and visual elements during translation. The few-shot learning capability of LLMs allows for the translation of fragmented texts by considering the overall context. Meanwhile, the advanced inpainting and editing abilities of diffusion models make it possible to fuse translated text seamlessly into the original image while preserving its style and realism. Additionally, our framework can be constructed entirely using open-source models and requires no training, making it highly accessible and easily expandable. To encourage advancement in the TATI task, we have meticulously compiled a test dataset called MTIT6, which consists of multilingual text image translation data from six language pairs.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
DANCE: Dual-View Distribution Alignment for Dataset Condensation
Authors:
Hansong Zhang,
Shikun Li,
Fanzhao Lin,
Wei** Wang,
Zhenxing Qian,
Shiming Ge
Abstract:
Dataset condensation addresses the problem of data burden by learning a small synthetic training set that preserves essential knowledge from the larger real training set. To date, the state-of-the-art (SOTA) results are often yielded by optimization-oriented methods, but their inefficiency hinders their application to realistic datasets. On the other hand, the Distribution-Matching (DM) methods sh…
▽ More
Dataset condensation addresses the problem of data burden by learning a small synthetic training set that preserves essential knowledge from the larger real training set. To date, the state-of-the-art (SOTA) results are often yielded by optimization-oriented methods, but their inefficiency hinders their application to realistic datasets. On the other hand, the Distribution-Matching (DM) methods show remarkable efficiency but sub-optimal results compared to optimization-oriented methods. In this paper, we reveal the limitations of current DM-based methods from the inner-class and inter-class views, i.e., Persistent Training and Distribution Shift. To address these problems, we propose a new DM-based method named Dual-view distribution AligNment for dataset CondEnsation (DANCE), which exploits a few pre-trained models to improve DM from both inner-class and inter-class views. Specifically, from the inner-class view, we construct multiple "middle encoders" to perform pseudo long-term distribution alignment, making the condensed set a good proxy of the real one during the whole training process; while from the inter-class view, we use the expert models to perform distribution calibration, ensuring the synthetic data remains in the real class region during condensing. Experiments demonstrate the proposed method achieves a SOTA performance while maintaining comparable efficiency with the original DM across various scenarios. Source codes are available at https://github.com/Hansong-Zhang/DANCE.
△ Less
Submitted 3 June, 2024;
originally announced June 2024.
-
All-In-One Medical Image Restoration via Task-Adaptive Routing
Authors:
Zhiwen Yang,
Haowei Chen,
Ziniu Qian,
Yang Yi,
Hui Zhang,
Dan Zhao,
Bingzheng Wei,
Yan Xu
Abstract:
Although single-task medical image restoration (MedIR) has witnessed remarkable success, the limited generalizability of these methods poses a substantial obstacle to wider application. In this paper, we focus on the task of all-in-one medical image restoration, aiming to address multiple distinct MedIR tasks with a single universal model. Nonetheless, due to significant differences between differ…
▽ More
Although single-task medical image restoration (MedIR) has witnessed remarkable success, the limited generalizability of these methods poses a substantial obstacle to wider application. In this paper, we focus on the task of all-in-one medical image restoration, aiming to address multiple distinct MedIR tasks with a single universal model. Nonetheless, due to significant differences between different MedIR tasks, training a universal model often encounters task interference issues, where different tasks with shared parameters may conflict with each other in the gradient update direction. This task interference leads to deviation of the model update direction from the optimal path, thereby affecting the model's performance. To tackle this issue, we propose a task-adaptive routing strategy, allowing conflicting tasks to select different network paths in spatial and channel dimensions, thereby mitigating task interference. Experimental results demonstrate that our proposed \textbf{A}ll-in-one \textbf{M}edical \textbf{I}mage \textbf{R}estoration (\textbf{AMIR}) network achieves state-of-the-art performance in three MedIR tasks: MRI super-resolution, CT denoising, and PET synthesis, both in single-task and all-in-one settings. The code and data will be available at \href{https://github.com/Yaziwel/All-In-One-Medical-Image-Restoration-via-Task-Adaptive-Routing.git}{https://github.com/Yaziwel/AMIR}.
△ Less
Submitted 28 June, 2024; v1 submitted 30 May, 2024;
originally announced May 2024.
-
JUNO Sensitivity to Invisible Decay Modes of Neutrons
Authors:
JUNO Collaboration,
Angel Abusleme,
Thomas Adam,
Kai Adamowicz,
Shakeel Ahmad,
Rizwan Ahmed,
Sebastiano Aiello,
Fengpeng An,
Qi An,
Giuseppe Andronico,
Nikolay Anfimov,
Vito Antonelli,
Tatiana Antoshkina,
João Pedro Athayde Marcondes de André,
Didier Auguste,
Weidong Bai,
Nikita Balashov,
Wander Baldini,
Andrea Barresi,
Davide Basilico,
Eric Baussan,
Marco Bellato,
Marco Beretta,
Antonio Bergnoli,
Daniel Bick
, et al. (635 additional authors not shown)
Abstract:
We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 ν$ or $nn \rightarrow 2 ν$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation mode…
▽ More
We explore the bound neutrons decay into invisible particles (e.g., $n\rightarrow 3 ν$ or $nn \rightarrow 2 ν$) in the JUNO liquid scintillator detector. The invisible decay includes two decay modes: $ n \rightarrow { inv} $ and $ nn \rightarrow { inv} $. The invisible decays of $s$-shell neutrons in $^{12}{\rm C}$ will leave a highly excited residual nucleus. Subsequently, some de-excitation modes of the excited residual nuclei can produce a time- and space-correlated triple coincidence signal in the JUNO detector. Based on a full Monte Carlo simulation informed with the latest available data, we estimate all backgrounds, including inverse beta decay events of the reactor antineutrino $\barν_e$, natural radioactivity, cosmogenic isotopes and neutral current interactions of atmospheric neutrinos. Pulse shape discrimination and multivariate analysis techniques are employed to further suppress backgrounds. With two years of exposure, JUNO is expected to give an order of magnitude improvement compared to the current best limits. After 10 years of data taking, the JUNO expected sensitivities at a 90% confidence level are $τ/B( n \rightarrow { inv} ) > 5.0 \times 10^{31} \, {\rm yr}$ and $τ/B( nn \rightarrow { inv} ) > 1.4 \times 10^{32} \, {\rm yr}$.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Online Prompt Pricing based on Combinatorial Multi-Armed Bandit and Hierarchical Stackelberg Game
Authors:
Meiling Li,
Hongrun Ren,
Haixu Xiong,
Zhenxing Qian,
Xinpeng Zhang
Abstract:
Generation models have shown promising performance in various tasks, making trading around machine learning models possible. In this paper, we aim at a novel prompt trading scenario, prompt bundle trading (PBT) system, and propose an online pricing mechanism. Based on the combinatorial multi-armed bandit (CMAB) and three-stage hierarchical Stackelburg (HS) game, our pricing mechanism considers the…
▽ More
Generation models have shown promising performance in various tasks, making trading around machine learning models possible. In this paper, we aim at a novel prompt trading scenario, prompt bundle trading (PBT) system, and propose an online pricing mechanism. Based on the combinatorial multi-armed bandit (CMAB) and three-stage hierarchical Stackelburg (HS) game, our pricing mechanism considers the profits of the consumer, platform, and seller, simultaneously achieving the profit satisfaction of these three participants. We break down the pricing issue into two steps, namely unknown category selection and incentive strategy optimization. The former step is to select a set of categories with the highest qualities, and the latter is to derive the optimal strategy for each participant based on the chosen categories. Unlike the existing fixed pricing mode, the PBT pricing mechanism we propose is more flexible and diverse, which is more in accord with the transaction needs of real-world scenarios. We test our method on a simulated text-to-image dataset. The experimental results demonstrate the effectiveness of our algorithm, which provides a feasible price-setting standard for the prompt marketplaces.
△ Less
Submitted 31 May, 2024; v1 submitted 23 May, 2024;
originally announced May 2024.
-
What Makes Good Few-shot Examples for Vision-Language Models?
Authors:
Zhaojun Guo,
**ghui Lu,
Xue**g Liu,
Rui Zhao,
ZhenXing Qian,
Fei Tan
Abstract:
Despite the notable advancements achieved by leveraging pre-trained vision-language (VL) models through few-shot tuning for downstream tasks, our detailed empirical study highlights a significant dependence of few-shot learning outcomes on the careful selection of training examples - a facet that has been previously overlooked in research. In this study, we delve into devising more effective strat…
▽ More
Despite the notable advancements achieved by leveraging pre-trained vision-language (VL) models through few-shot tuning for downstream tasks, our detailed empirical study highlights a significant dependence of few-shot learning outcomes on the careful selection of training examples - a facet that has been previously overlooked in research. In this study, we delve into devising more effective strategies for the meticulous selection of few-shot training examples, as opposed to relying on random sampling, to enhance the potential of existing few-shot prompt learning methodologies. To achieve this, we assess the effectiveness of various Active Learning (AL) techniques for instance selection, such as Entropy and Margin of Confidence, within the context of few-shot training. Furthermore, we introduce two innovative selection methods - Representativeness (REPRE) and Gaussian Monte Carlo (Montecarlo) - designed to proactively pinpoint informative examples for labeling in relation to pre-trained VL models. Our findings demonstrate that both REPRE and Montecarlo significantly surpass both random selection and AL-based strategies in few-shot training scenarios. The research also underscores that these instance selection methods are model-agnostic, offering a versatile enhancement to a wide array of few-shot training methodologies.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Fed-Credit: Robust Federated Learning with Credibility Management
Authors:
Jiayan Chen,
Zhirong Qian,
Tianhui Meng,
Xitong Gao,
Tian Wang,
Weijia Jia
Abstract:
Aiming at privacy preservation, Federated Learning (FL) is an emerging machine learning approach enabling model training on decentralized devices or data sources. The learning mechanism of FL relies on aggregating parameter updates from individual clients. However, this process may pose a potential security risk due to the presence of malicious devices. Existing solutions are either costly due to…
▽ More
Aiming at privacy preservation, Federated Learning (FL) is an emerging machine learning approach enabling model training on decentralized devices or data sources. The learning mechanism of FL relies on aggregating parameter updates from individual clients. However, this process may pose a potential security risk due to the presence of malicious devices. Existing solutions are either costly due to the use of compute-intensive technology, or restrictive for reasons of strong assumptions such as the prior knowledge of the number of attackers and how they attack. Few methods consider both privacy constraints and uncertain attack scenarios. In this paper, we propose a robust FL approach based on the credibility management scheme, called Fed-Credit. Unlike previous studies, our approach does not require prior knowledge of the nodes and the data distribution. It maintains and employs a credibility set, which weighs the historical clients' contributions based on the similarity between the local models and global model, to adjust the global model update. The subtlety of Fed-Credit is that the time decay and attitudinal value factor are incorporated into the dynamic adjustment of the reputation weights and it boasts a computational complexity of O(n) (n is the number of the clients). We conducted extensive experiments on the MNIST and CIFAR-10 datasets under 5 types of attacks. The results exhibit superior accuracy and resilience against adversarial attacks, all while maintaining comparatively low computational complexity. Among these, on the Non-IID CIFAR-10 dataset, our algorithm exhibited performance enhancements of 19.5% and 14.5%, respectively, in comparison to the state-of-the-art algorithm when dealing with two types of data poisoning attacks.
△ Less
Submitted 19 May, 2024;
originally announced May 2024.
-
Search for the leptonic decays $D^{*+}\to e^+ν_e$ and $D^{*+}\to μ^+ν_μ$
Authors:
BESIII Collaboration,
M. Ablikim,
M. N. Achasov,
P. Adlarson,
M. Albrecht,
R. Aliberti,
A. Amoroso,
M. R. An,
Q. An,
Y. Bai,
O. Bakina,
R. Baldini Ferroli,
I. Balossino,
Y. Ban,
V. Batozskaya,
D. Becker,
K. Begzsuren,
N. Berger,
M. Bertani,
D. Bettoni,
F. Bianchi,
E. Bianco,
J. Bloms,
A. Bortone,
I. Boyko
, et al. (559 additional authors not shown)
Abstract:
We present the first search for the leptonic decays $D^{*+}\to e^+ν_e$ and $D^{*+}\to μ^+ν_μ$ by analyzing a data sample of electron-positron collisions recorded with the BESIII detector at center-of-mass energies between 4.178 and 4.226 GeV, corresponding to an integrated luminosity of 6.32~fb$^{-1}$. No significant signal is observed. The upper limits on the branching fractions for…
▽ More
We present the first search for the leptonic decays $D^{*+}\to e^+ν_e$ and $D^{*+}\to μ^+ν_μ$ by analyzing a data sample of electron-positron collisions recorded with the BESIII detector at center-of-mass energies between 4.178 and 4.226 GeV, corresponding to an integrated luminosity of 6.32~fb$^{-1}$. No significant signal is observed. The upper limits on the branching fractions for $D^{*+}\to e^+ν_e$ and $D^{*+}\to μ^+ν_μ$ are set to be $1.1 \times 10^{-5}$ and $4.3 \times 10^{-6}$ at 90\% confidence level, respectively.
△ Less
Submitted 14 May, 2024;
originally announced May 2024.
-
Large Bulk Photovoltaic Effect of Nitride Perovskite LaWN3 as Photocatalyst for Hydrogen Evolution Reaction: First Principles Calculation
Authors:
Keyu An,
Zhuang Qian,
Haoqiang Ai,
Zhichao Yu,
Shuangpeng Wang,
Hui Pan
Abstract:
Bulk photovoltaic effect in noncentrosymmetric materials is a fundamental and significant property that holds potential for high-efficiency energy harvesting, such as photoelectric application and photocatalysis. Here, based on first principles calculation, we explore the electronic structure, dielectric property, shift current, and photocatalytic performance of novel nitride perovskite LaWN3. Our…
▽ More
Bulk photovoltaic effect in noncentrosymmetric materials is a fundamental and significant property that holds potential for high-efficiency energy harvesting, such as photoelectric application and photocatalysis. Here, based on first principles calculation, we explore the electronic structure, dielectric property, shift current, and photocatalytic performance of novel nitride perovskite LaWN3. Our calculations show that LaWN3 possesses large dielectric constants and shift current. The shift current can be enhanced by considering spin-orbit coupling and is switchable by ferroelectric polarization, which suggests LaWN3 is a promising candidate for logic and neuromorphic photovoltaic devices driven by ferroelectric polarization. Additionally, LaWN3 shows advanced photocatalytic hydrogen evolution reaction as a photocatalyst. Especially, the (110) surface represents low surface energy and Gibbes free energy, implying that the (110) surface may be exposed to the active surface. Our finding highlights potential applications of novel polar nitride perovskite LaWN3 in various fields not only photoelectric devices but also photocatalysis.
△ Less
Submitted 13 May, 2024; v1 submitted 7 May, 2024;
originally announced May 2024.
-
The best whistler: a cavitating tip vortex
Authors:
Zhaohui Qian,
Weixiang Ye,
Yongshun Zeng,
Xiaoxing Peng,
Xianwu Luo
Abstract:
The discrete tone radiated from a cavitating tip vortex, known as "vortex singing", was first recognized in 1989, but its sound generation mechanism has remained a mystery for over thirty years. In this letter, by means of the correction for the cavitation bubble dynamics and the dispersion relation of cavity interfacial waves, we found that after the far-end disturbances propagate upstream, the w…
▽ More
The discrete tone radiated from a cavitating tip vortex, known as "vortex singing", was first recognized in 1989, but its sound generation mechanism has remained a mystery for over thirty years. In this letter, by means of the correction for the cavitation bubble dynamics and the dispersion relation of cavity interfacial waves, we found that after the far-end disturbances propagate upstream, the whistling vortex should be triggered by near-end sound sources, the breathing mode waves. Further utilizing the theoretical solutions for singing lines and the potential singing cavitation number with frequency, we accurately identified all available tests for seeking the vortex singing over the past three decades, answering a long-standing perplexity: why such a best whistler is able to appear only within a narrow range of the cavitation number.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
Trigger mechanism for a singing cavitating tip vortex
Authors:
Zhaohui Qian,
Yongshun Zeng,
Xiaoxing Peng,
Xianwu Luo
Abstract:
The discrete tone radiated from tip vortex cavitation (TVC), known as 'vortex singing', was recognized in 1989, but its triggering remains unclear for over thirty years. In this study, the desinent cavitation number and viscous correction are applied to describe the dynamics of cavitation bubbles and the dispersion relation of cavity interfacial waves. The wavenumber-frequency spectrum of the cavi…
▽ More
The discrete tone radiated from tip vortex cavitation (TVC), known as 'vortex singing', was recognized in 1989, but its triggering remains unclear for over thirty years. In this study, the desinent cavitation number and viscous correction are applied to describe the dynamics of cavitation bubbles and the dispersion relation of cavity interfacial waves. The wavenumber-frequency spectrum of the cavity radius from the experiment in CSSRC indicates that singing waves predominantly consist of the stationary double helical modes (kθ = 2- and -2+) and the breathing mode (kθ = 0-), rather than standing waves as assumed in previous literatures. Moreover, two trigger mechanisms, expressed by two triggering lines, are proposed: the twisted TVC, initially at rest, is driven into motion through the corrected natural frequency (fn) due to the step change of the far-field pressure. Subsequently, the frequency associated with the zero-group-velocity point (fzgv) at kθ = 0- is excited through fi, the frequency at the intersection of dispersion curves at kθ = 0- and -2+, or fj, the frequency at the intersection of dispersion curves at kθ = 0- and 2-, corresponding to two types of the vortex singing triggering. These solutions, without empirical parameters, are validated using singing conditions provided by CSSRC and G.T.H., respectively. Furthermore, the coherence and the cross-power spectral density spectrum indicates a large-scale breathing wave propagating along the singing cavity surface and travelling from downstream to hydrofoil tip, providing us a comprehensive understanding for the triggering of vortex singing.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
SMCD: High Realism Motion Style Transfer via Mamba-based Diffusion
Authors:
Ziyun Qian,
Zeyu Xiao,
Zhenyi Wu,
Dingkang Yang,
Mingcheng Li,
Shunli Wang,
Shuaibing Wang,
Dongliang Kou,
Lihua Zhang
Abstract:
Motion style transfer is a significant research direction in multimedia applications. It enables the rapid switching of different styles of the same motion for virtual digital humans, thus vastly increasing the diversity and realism of movements. It is widely applied in multimedia scenarios such as movies, games, and the Metaverse. However, most of the current work in this field adopts the GAN, wh…
▽ More
Motion style transfer is a significant research direction in multimedia applications. It enables the rapid switching of different styles of the same motion for virtual digital humans, thus vastly increasing the diversity and realism of movements. It is widely applied in multimedia scenarios such as movies, games, and the Metaverse. However, most of the current work in this field adopts the GAN, which may lead to instability and convergence issues, making the final generated motion sequence somewhat chaotic and unable to reflect a highly realistic and natural style. To address these problems, we consider style motion as a condition and propose the Style Motion Conditioned Diffusion (SMCD) framework for the first time, which can more comprehensively learn the style features of motion. Moreover, we apply Mamba model for the first time in the motion style transfer field, introducing the Motion Style Mamba (MSM) module to handle longer motion sequences. Thirdly, aiming at the SMCD framework, we propose Diffusion-based Content Consistency Loss and Content Consistency Loss to assist the overall framework's training. Finally, we conduct extensive experiments. The results reveal that our method surpasses state-of-the-art methods in both qualitative and quantitative comparisons, capable of generating more realistic motion sequences.
△ Less
Submitted 5 May, 2024;
originally announced May 2024.
-
Correlation-Decoupled Knowledge Distillation for Multimodal Sentiment Analysis with Incomplete Modalities
Authors:
Mingcheng Li,
Dingkang Yang,
Xiao Zhao,
Shuaibing Wang,
Yan Wang,
Kun Yang,
Mingyang Sun,
Dongliang Kou,
Ziyun Qian,
Lihua Zhang
Abstract:
Multimodal sentiment analysis (MSA) aims to understand human sentiment through multimodal data. Most MSA efforts are based on the assumption of modality completeness. However, in real-world applications, some practical factors cause uncertain modality missingness, which drastically degrades the model's performance. To this end, we propose a Correlation-decoupled Knowledge Distillation (CorrKD) fra…
▽ More
Multimodal sentiment analysis (MSA) aims to understand human sentiment through multimodal data. Most MSA efforts are based on the assumption of modality completeness. However, in real-world applications, some practical factors cause uncertain modality missingness, which drastically degrades the model's performance. To this end, we propose a Correlation-decoupled Knowledge Distillation (CorrKD) framework for the MSA task under uncertain missing modalities. Specifically, we present a sample-level contrastive distillation mechanism that transfers comprehensive knowledge containing cross-sample correlations to reconstruct missing semantics. Moreover, a category-guided prototype distillation mechanism is introduced to capture cross-category correlations using category prototypes to align feature distributions and generate favorable joint representations. Eventually, we design a response-disentangled consistency distillation strategy to optimize the sentiment decision boundaries of the student network through response disentanglement and mutual information maximization. Comprehensive experiments on three datasets indicate that our framework can achieve favorable improvements compared with several baselines.
△ Less
Submitted 10 June, 2024; v1 submitted 25 April, 2024;
originally announced April 2024.
-
Mean field equations arising from random vortex dynamics
Authors:
Jiawei Li,
Zhongmin Qian
Abstract:
We consider Mckean-Vlasov type stochastic differential equations with multiplicative noise arising from the random vortex method. Such an equation can be viewed as the mean-field limit of interacting particle systems with singular interacting kernels such as the Biot-Savart kernel. A new estimate for the transition probability density of diffusion processes will be formulated to handle the singula…
▽ More
We consider Mckean-Vlasov type stochastic differential equations with multiplicative noise arising from the random vortex method. Such an equation can be viewed as the mean-field limit of interacting particle systems with singular interacting kernels such as the Biot-Savart kernel. A new estimate for the transition probability density of diffusion processes will be formulated to handle the singularity of the interacting kernel. The existence and uniqueness of the weak solution of such SDEs will be established as the main result.
△ Less
Submitted 7 April, 2024;
originally announced April 2024.
-
D$^3$: Scaling Up Deepfake Detection by Learning from Discrepancy
Authors:
Yongqi Yang,
Zhihao Qian,
Ye Zhu,
Yu Wu
Abstract:
The boom of Generative AI brings opportunities entangled with risks and concerns. In this work, we seek a step toward a universal deepfake detection system with better generalization and robustness, to accommodate the responsible deployment of diverse image generative models. We do so by first scaling up the existing detection task setup from the one-generator to multiple-generators in training, d…
▽ More
The boom of Generative AI brings opportunities entangled with risks and concerns. In this work, we seek a step toward a universal deepfake detection system with better generalization and robustness, to accommodate the responsible deployment of diverse image generative models. We do so by first scaling up the existing detection task setup from the one-generator to multiple-generators in training, during which we disclose two challenges presented in prior methodological designs. Specifically, we reveal that the current methods tailored for training on one specific generator either struggle to learn comprehensive artifacts from multiple generators or tend to sacrifice their ability to identify fake images from seen generators (i.e., In-Domain performance) to exchange the generalization for unseen generators (i.e., Out-Of-Domain performance). To tackle the above challenges, we propose our Discrepancy Deepfake Detector (D$^3$) framework, whose core idea is to learn the universal artifacts from multiple generators by introducing a parallel network branch that takes a distorted image as extra discrepancy signal to supplement its original counterpart. Extensive scaled-up experiments on the merged UFD and GenImage datasets with six detection models demonstrate the effectiveness of our framework, achieving a 5.3% accuracy improvement in the OOD testing compared to the current SOTA methods while maintaining the ID performance.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
A Novel Stratified Analysis Method for Testing and Estimating Overall Treatment Effects on Time-to-Event Outcomes Using Average Hazard with Survival Weight
Authors:
Zihan Qian,
Lu Tian,
Miki Horiguchi,
Hajime Uno
Abstract:
Given the limitations of using the Cox hazard ratio to summarize the magnitude of the treatment effect, alternative measures that do not have these limitations are gaining attention. One of the recently proposed alternative methods uses the average hazard with survival weight (AH). This population quantity can be interpreted as the average intensity of the event occurrence in a given time window t…
▽ More
Given the limitations of using the Cox hazard ratio to summarize the magnitude of the treatment effect, alternative measures that do not have these limitations are gaining attention. One of the recently proposed alternative methods uses the average hazard with survival weight (AH). This population quantity can be interpreted as the average intensity of the event occurrence in a given time window that does not involve study-specific censoring. Inference procedures for the ratio of AH and difference in AH have already been proposed in simple randomized controlled trial settings to compare two groups. However, methods with stratification factors have not been well discussed, although stratified analysis is often used in practice to adjust for confounding factors and increase the power to detect a between-group difference. The conventional stratified analysis or meta-analysis approach, which integrates stratum-specific treatment effects using an optimal weight, directly applies to the ratio of AH and difference in AH. However, this conventional approach has significant limitations similar to the Cochran-Mantel-Haenszel method for a binary outcome and the stratified Cox procedure for a time-to-event outcome. To address this, we propose a new stratified analysis method for AH using standardization. With the proposed method, one can summarize the between-group treatment effect in both absolute difference and relative terms, adjusting for stratification factors. This can be a valuable alternative to the traditional stratified Cox procedure to estimate and report the magnitude of the treatment effect on time-to-event outcomes using hazard.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
MugenNet: A Novel Combined Convolution Neural Network and Transformer Network with its Application for Colonic Polyp Image Segmentation
Authors:
Chen Peng,
Zhiqin Qian,
Kunyu Wang,
Qi Luo,
Zhuming Bi,
Wenjun Zhang
Abstract:
Biomedical image segmentation is a very important part in disease diagnosis. The term "colonic polyps" refers to polypoid lesions that occur on the surface of the colonic mucosa within the intestinal lumen. In clinical practice, early detection of polyps is conducted through colonoscopy examinations and biomedical image processing. Therefore, the accurate polyp image segmentation is of great signi…
▽ More
Biomedical image segmentation is a very important part in disease diagnosis. The term "colonic polyps" refers to polypoid lesions that occur on the surface of the colonic mucosa within the intestinal lumen. In clinical practice, early detection of polyps is conducted through colonoscopy examinations and biomedical image processing. Therefore, the accurate polyp image segmentation is of great significance in colonoscopy examinations. Convolutional Neural Network (CNN) is a common automatic segmentation method, but its main disadvantage is the long training time. Transformer utilizes a self-attention mechanism, which essentially assigns different importance weights to each piece of information, thus achieving high computational efficiency during segmentation. However, a potential drawback is the risk of information loss. In the study reported in this paper, based on the well-known hybridization principle, we proposed a method to combine CNN and Transformer to retain the strengths of both, and we applied this method to build a system called MugenNet for colonic polyp image segmentation. We conducted a comprehensive experiment to compare MugenNet with other CNN models on five publicly available datasets. The ablation experiment on MugentNet was conducted as well. The experimental results show that MugenNet achieves significantly higher processing speed and accuracy compared with CNN alone. The generalized implication with our work is a method to optimally combine two complimentary methods of machine learning.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
Harnessing the Power of Large Language Model for Uncertainty Aware Graph Processing
Authors:
Zhenyu Qian,
Yiming Qian,
Yuting Song,
Fei Gao,
Hai **,
Chen Yu,
Xia Xie
Abstract:
Handling graph data is one of the most difficult tasks. Traditional techniques, such as those based on geometry and matrix factorization, rely on assumptions about the data relations that become inadequate when handling large and complex graph data. On the other hand, deep learning approaches demonstrate promising results in handling large graph data, but they often fall short of providing interpr…
▽ More
Handling graph data is one of the most difficult tasks. Traditional techniques, such as those based on geometry and matrix factorization, rely on assumptions about the data relations that become inadequate when handling large and complex graph data. On the other hand, deep learning approaches demonstrate promising results in handling large graph data, but they often fall short of providing interpretable explanations. To equip the graph processing with both high accuracy and explainability, we introduce a novel approach that harnesses the power of a large language model (LLM), enhanced by an uncertainty-aware module to provide a confidence score on the generated answer. We experiment with our approach on two graph processing tasks: few-shot knowledge graph completion and graph classification. Our results demonstrate that through parameter efficient fine-tuning, the LLM surpasses state-of-the-art algorithms by a substantial margin across ten diverse benchmark datasets. Moreover, to address the challenge of explainability, we propose an uncertainty estimation based on perturbation, along with a calibration scheme to quantify the confidence scores of the generated answers. Our confidence measure achieves an AUC of 0.8 or higher on seven out of the ten datasets in predicting the correctness of the answer generated by LLM.
△ Less
Submitted 12 April, 2024; v1 submitted 31 March, 2024;
originally announced April 2024.
-
Surface variation analysis of freeform optical systems over surface frequency bands for prescribed wavefront errors
Authors:
Rundong Fan,
Shili Wei,
Huiru JI,
Zhuang Qian,
Hao Tan,
Yan Mo,
Donglin MA
Abstract:
The surface errors of freeform surfaces reflect the manufacturing complexities and significantly impact the feasibility of processing designed optical systems. With multiple degrees of freedom, freeform surfaces pose challenges in surface tolerance analysis in the field. Nevertheless, current research has neglected the influence of surface slopes on the directions of ray propagation. A sudden alte…
▽ More
The surface errors of freeform surfaces reflect the manufacturing complexities and significantly impact the feasibility of processing designed optical systems. With multiple degrees of freedom, freeform surfaces pose challenges in surface tolerance analysis in the field. Nevertheless, current research has neglected the influence of surface slopes on the directions of ray propagation. A sudden alteration in the surface slope will lead to a corresponding abrupt shift in the wavefront, even when the change in surface sag is minimal. Moreover, within the realm of freeform surface manufacturing, variation in surface slope across different frequency bands may give rise to unique surface variation. Within the context of this study, we propose a tolerance analysis method to analyze surface variation in freeform surfaces considering surface frequency band slopes based on real ray data. This approach utilizes real ray data to rapidly evaluate surface variation within a specified frequency band of surface slopes. Crucially, our proposed method yields the capability to obtain system surface variation with significant wavefront aberration, in contrast to previous methodologies. The feasibility and advantages of this framework are assessed by analyzing a single-mirror system with a single field and an off-axis two-mirror system. We expect to integrate the proposed methodology with freeform surface design and manufacturing, thereby expanding the scope of freeform optics.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Random vortex dynamics and Monte-Carlo simulations for wall-bounded viscous flows
Authors:
Vladislav Cherepanov,
Sebastian W. Ertel,
Zhongmin Qian,
Jiang-Lun Wu
Abstract:
Functional integral representations for solutions of the motion equations for wall-bounded incompressible viscous flows, expressed (implicitly) in terms of distributions of solutions to stochastic differential equations of McKean-Vlasov type, are established by using a perturbation technique. These representations are used to obtain exact random vortex dynamics for wall-bounded viscous flows. Nume…
▽ More
Functional integral representations for solutions of the motion equations for wall-bounded incompressible viscous flows, expressed (implicitly) in terms of distributions of solutions to stochastic differential equations of McKean-Vlasov type, are established by using a perturbation technique. These representations are used to obtain exact random vortex dynamics for wall-bounded viscous flows. Numerical schemes therefore are proposed and the convergence of the numerical schemes for random vortex dynamics with an additional force term is established. Several numerical experiments are carried out for demonstrating the motion of a viscous flow within a thin layer next to the fluid boundary.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Hierarchical Gaussian Mixture Normalizing Flow Modeling for Unified Anomaly Detection
Authors:
Xincheng Yao,
Ruoqi Li,
Zefeng Qian,
Lu Wang,
Chongyang Zhang
Abstract:
Unified anomaly detection (AD) is one of the most challenges for anomaly detection, where one unified model is trained with normal samples from multiple classes with the objective to detect anomalies in these classes. For such a challenging task, popular normalizing flow (NF) based AD methods may fall into a "homogeneous map**" issue,where the NF-based AD models are biased to generate similar la…
▽ More
Unified anomaly detection (AD) is one of the most challenges for anomaly detection, where one unified model is trained with normal samples from multiple classes with the objective to detect anomalies in these classes. For such a challenging task, popular normalizing flow (NF) based AD methods may fall into a "homogeneous map**" issue,where the NF-based AD models are biased to generate similar latent representations for both normal and abnormal features, and thereby lead to a high missing rate of anomalies. In this paper, we propose a novel Hierarchical Gaussian mixture normalizing flow modeling method for accomplishing unified Anomaly Detection, which we call HGAD. Our HGAD consists of two key components: inter-class Gaussian mixture modeling and intra-class mixed class centers learning. Compared to the previous NF-based AD methods, the hierarchical Gaussian mixture modeling approach can bring stronger representation capability to the latent space of normalizing flows, so that even complex multi-class distribution can be well represented and learned in the latent space. In this way, we can avoid map** different class distributions into the same single Gaussian prior, thus effectively avoiding or mitigating the "homogeneous map**" issue. We further indicate that the more distinguishable different class centers, the more conducive to avoiding the bias issue. Thus, we further propose a mutual information maximization loss for better structuring the latent feature space. We evaluate our method on four real-world AD benchmarks, where we can significantly improve the previous NF-based AD methods and also outperform the SOTA unified AD methods.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
ODE Discovery for Longitudinal Heterogeneous Treatment Effects Inference
Authors:
Krzysztof Kacprzyk,
Samuel Holt,
Jeroen Berrevoets,
Zhaozhi Qian,
Mihaela van der Schaar
Abstract:
Inferring unbiased treatment effects has received widespread attention in the machine learning community. In recent years, our community has proposed numerous solutions in standard settings, high-dimensional treatment settings, and even longitudinal settings. While very diverse, the solution has mostly relied on neural networks for inference and simultaneous correction of assignment bias. New appr…
▽ More
Inferring unbiased treatment effects has received widespread attention in the machine learning community. In recent years, our community has proposed numerous solutions in standard settings, high-dimensional treatment settings, and even longitudinal settings. While very diverse, the solution has mostly relied on neural networks for inference and simultaneous correction of assignment bias. New approaches typically build on top of previous approaches by proposing new (or refined) architectures and learning algorithms. However, the end result -- a neural-network-based inference machine -- remains unchallenged. In this paper, we introduce a different type of solution in the longitudinal setting: a closed-form ordinary differential equation (ODE). While we still rely on continuous optimization to learn an ODE, the resulting inference machine is no longer a neural network. Doing so yields several advantages such as interpretability, irregular sampling, and a different set of identification assumptions. Above all, we consider the introduction of a completely new type of solution to be our most important contribution as it may spark entirely new innovations in treatment effects in general. We facilitate this by formulating our contribution as a framework that can transform any ODE discovery method into a treatment effects method.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Mitigating Dialogue Hallucination for Large Vision Language Models via Adversarial Instruction Tuning
Authors:
Dongmin Park,
Zhaofang Qian,
Guangxing Han,
Ser-Nam Lim
Abstract:
Mitigating hallucinations of Large Vision Language Models,(LVLMs) is crucial to enhance their reliability for general-purpose assistants. This paper shows that such hallucinations of LVLMs can be significantly exacerbated by preceding user-system dialogues. To precisely measure this, we first present an evaluation benchmark by extending popular multi-modal benchmark datasets with prepended halluci…
▽ More
Mitigating hallucinations of Large Vision Language Models,(LVLMs) is crucial to enhance their reliability for general-purpose assistants. This paper shows that such hallucinations of LVLMs can be significantly exacerbated by preceding user-system dialogues. To precisely measure this, we first present an evaluation benchmark by extending popular multi-modal benchmark datasets with prepended hallucinatory dialogues powered by our novel Adversarial Question Generator (AQG), which can automatically generate image-related yet adversarial dialogues by adopting adversarial attacks on LVLMs. On our benchmark, the zero-shot performance of state-of-the-art LVLMs drops significantly for both the VQA and Captioning tasks. Next, we further reveal this hallucination is mainly due to the prediction bias toward preceding dialogues rather than visual content. To reduce this bias, we propose Adversarial Instruction Tuning (AIT) that robustly fine-tunes LVLMs against hallucinatory dialogues. Extensive experiments show our proposed approach successfully reduces dialogue hallucination while maintaining performance.
△ Less
Submitted 25 May, 2024; v1 submitted 15 March, 2024;
originally announced March 2024.
-
Search for cosmic-ray boosted sub-MeV dark matter-electron scatterings in PandaX-4T
Authors:
Xiaofeng Shang,
Abdusalam Abdukerim,
Zihao Bo,
Wei Chen,
Xun Chen,
Chen Cheng,
Zhaokan Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Lisheng Geng,
Karl Giboni,
Xuyuan Guo,
Chencheng Han,
Ke Han,
Changda He,
**rong He,
Di Huang,
Junting Huang,
Zhou Huang,
Ruquan Hou,
Yu Hou,
Xiangdong Ji,
Yonglin Ju,
Chenxiang Li
, et al. (67 additional authors not shown)
Abstract:
We report the first search for the elastic scatterings between cosmic-ray boosted sub-MeV dark matter and electrons in the PandaX-4T liquid xenon experiment. Sub-MeV dark matter particles can be accelerated by scattering with electrons in the cosmic rays and produce detectable electron recoil signals in the detector. Using the commissioning data from PandaX-4T of 0.63~tonne$\cdot$year exposure, we…
▽ More
We report the first search for the elastic scatterings between cosmic-ray boosted sub-MeV dark matter and electrons in the PandaX-4T liquid xenon experiment. Sub-MeV dark matter particles can be accelerated by scattering with electrons in the cosmic rays and produce detectable electron recoil signals in the detector. Using the commissioning data from PandaX-4T of 0.63~tonne$\cdot$year exposure, we set new constraints on DM-electron scattering cross sections for DM masses ranging from 10~eV/$c^2$ to 3~keV/$c^2$.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
HandGCAT: Occlusion-Robust 3D Hand Mesh Reconstruction from Monocular Images
Authors:
Shuaibing Wang,
Shunli Wang,
Dingkang Yang,
Mingcheng Li,
Ziyun Qian,
Liuzhen Su,
Lihua Zhang
Abstract:
We propose a robust and accurate method for reconstructing 3D hand mesh from monocular images. This is a very challenging problem, as hands are often severely occluded by objects. Previous works often have disregarded 2D hand pose information, which contains hand prior knowledge that is strongly correlated with occluded regions. Thus, in this work, we propose a novel 3D hand mesh reconstruction ne…
▽ More
We propose a robust and accurate method for reconstructing 3D hand mesh from monocular images. This is a very challenging problem, as hands are often severely occluded by objects. Previous works often have disregarded 2D hand pose information, which contains hand prior knowledge that is strongly correlated with occluded regions. Thus, in this work, we propose a novel 3D hand mesh reconstruction network HandGCAT, that can fully exploit hand prior as compensation information to enhance occluded region features. Specifically, we designed the Knowledge-Guided Graph Convolution (KGC) module and the Cross-Attention Transformer (CAT) module. KGC extracts hand prior information from 2D hand pose by graph convolution. CAT fuses hand prior into occluded regions by considering their high correlation. Extensive experiments on popular datasets with challenging hand-object occlusions, such as HO3D v2, HO3D v3, and DexYCB demonstrate that our HandGCAT reaches state-of-the-art performance. The code is available at https://github.com/heartStrive/HandGCAT.
△ Less
Submitted 26 February, 2024;
originally announced March 2024.
-
Can LLMs' Tuning Methods Work in Medical Multimodal Domain?
Authors:
Jiawei Chen,
Yue Jiang,
Dingkang Yang,
Mingcheng Li,
**jie Wei,
Ziyun Qian,
Lihua Zhang
Abstract:
While large language models (LLMs) excel in world knowledge understanding, adapting them to specific subfields requires precise adjustments. Due to the model's vast scale, traditional global fine-tuning methods for large models can be computationally expensive and impact generalization. To address this challenge, a range of innovative Parameters-Efficient Fine-Tuning (PEFT) methods have emerged an…
▽ More
While large language models (LLMs) excel in world knowledge understanding, adapting them to specific subfields requires precise adjustments. Due to the model's vast scale, traditional global fine-tuning methods for large models can be computationally expensive and impact generalization. To address this challenge, a range of innovative Parameters-Efficient Fine-Tuning (PEFT) methods have emerged and achieved remarkable success in both LLMs and Large Vision-Language Models (LVLMs). In the medical domain, fine-tuning a medical Vision-Language Pretrained (VLP) model is essential for adapting it to specific tasks. Can the fine-tuning methods for large models be transferred to the medical field to enhance transfer learning efficiency? In this paper, we delve into the fine-tuning methods of LLMs and conduct extensive experiments to investigate the impact of fine-tuning methods for large models on existing multimodal models in the medical domain from the training data level and the model structure level. We show the different impacts of fine-tuning methods for large models on medical VLMs and develop the most efficient ways to fine-tune medical VLP models. We hope this research can guide medical domain researchers in optimizing VLMs' training costs, fostering the broader application of VLMs in healthcare fields. Code and dataset will be released upon acceptance.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
Detecting Neutrinos from Supernova Bursts in PandaX-4T
Authors:
Binyu Pang,
Abdusalam Abdukerim,
Zihao Bo,
Wei Chen,
Xun Chen,
Chen Cheng,
Zhaokan Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Changbo Fu,
Mengting Fu,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xuyuan Guo,
Chencheng Han,
Ke Han,
Changda He,
**rong He,
Di Huang,
Yanlin Huang,
Junting Huang,
Zhou Huang,
Ruquan Hou
, et al. (71 additional authors not shown)
Abstract:
Neutrinos from core-collapse supernovae are essential for the understanding of neutrino physics and stellar evolution. The dual-phase xenon dark matter detectors can provide a way to track explosions of galactic supernovae by detecting neutrinos through coherent elastic neutrino-nucleus scatterings. In this study, a variation of progenitor masses as well as explosion models are assumed to predict…
▽ More
Neutrinos from core-collapse supernovae are essential for the understanding of neutrino physics and stellar evolution. The dual-phase xenon dark matter detectors can provide a way to track explosions of galactic supernovae by detecting neutrinos through coherent elastic neutrino-nucleus scatterings. In this study, a variation of progenitor masses as well as explosion models are assumed to predict the neutrino fluxes and spectra, which result in the number of expected neutrino events ranging from 6.6 to 13.7 at a distance of 10 kpc over a 10-second duration with negligible backgrounds at PandaX-4T. Two specialized triggering alarms for monitoring supernova burst neutrinos are built. The efficiency of detecting supernova explosions at various distances in the Milky Way is estimated. These alarms will be implemented in the real-time supernova monitoring system at PandaX-4T in the near future, providing the astronomical communities with supernova early warnings.
△ Less
Submitted 10 March, 2024;
originally announced March 2024.
-
Signal Response Model in PandaX-4T
Authors:
Yunyang Luo,
Zihao Bo,
Shibo Zhang,
Abdusalam Abdukerim,
Chen Cheng,
Wei Chen,
Xun Chen,
Yunhua Chen,
Zhaokan Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Changbo Fu,
Mengting Fu,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xuyuan Guo,
Chencheng Han,
Ke Han,
Changda He,
**rong He,
Di Huang,
Yanlin Huang,
Zhou Huang
, et al. (66 additional authors not shown)
Abstract:
PandaX-4T experiment is a deep-underground dark matter direct search experiment that employs a dual-phase time projection chamber with a sensitive volume containing 3.7 tonne of liquid xenon. The detector of PandaX-4T is capable of simultaneously collecting the primary scintillation and ionization signals, utilizing their ratio to discriminate dark matter signals from background sources such as ga…
▽ More
PandaX-4T experiment is a deep-underground dark matter direct search experiment that employs a dual-phase time projection chamber with a sensitive volume containing 3.7 tonne of liquid xenon. The detector of PandaX-4T is capable of simultaneously collecting the primary scintillation and ionization signals, utilizing their ratio to discriminate dark matter signals from background sources such as gamma rays and beta particles. The signal response model plays a crucial role in interpreting the data obtained by PandaX-4T. It describes the conversion from the deposited energy by dark matter interactions to the detectable signals within the detector. The signal response model is utilized in various PandaX-4T results. This work provides a comprehensive description of the procedures involved in constructing and parameter-fitting the signal response model for the energy range of approximately 1 keV to 25 keV for electronic recoils and 6 keV to 90 keV for nuclear recoils. It also covers the signal reconstruction, selection, and correction methods, which are crucial components integrated into the signal response model.
△ Less
Submitted 14 June, 2024; v1 submitted 7 March, 2024;
originally announced March 2024.
-
Regeneration Based Training-free Attribution of Fake Images Generated by Text-to-Image Generative Models
Authors:
Meiling Li,
Zhenxing Qian,
Xinpeng Zhang
Abstract:
Text-to-image generative models have recently garnered significant attention due to their ability to generate images based on prompt descriptions. While these models have shown promising performance, concerns have been raised regarding the potential misuse of the generated fake images. In response to this, we have presented a simple yet effective training-free method to attribute fake images gener…
▽ More
Text-to-image generative models have recently garnered significant attention due to their ability to generate images based on prompt descriptions. While these models have shown promising performance, concerns have been raised regarding the potential misuse of the generated fake images. In response to this, we have presented a simple yet effective training-free method to attribute fake images generated by text-to-image models to their source models. Given a test image to be attributed, we first inverse the textual prompt of the image, and then put the reconstructed prompt into different candidate models to regenerate candidate fake images. By calculating and ranking the similarity of the test image and the candidate images, we can determine the source of the image. This attribution allows model owners to be held accountable for any misuse of their models. Note that our approach does not limit the number of candidate text-to-image generative models. Comprehensive experiments reveal that (1) Our method can effectively attribute fake images to their source models, achieving comparable attribution performance with the state-of-the-art method; (2) Our method has high scalability ability, which is well adapted to real-world attribution scenarios. (3) The proposed method yields satisfactory robustness to common attacks, such as Gaussian blurring, JPEG compression, and Resizing. We also analyze the factors that influence the attribution performance, and explore the boost brought by the proposed method as a plug-in to improve the performance of existing SOTA. We hope our work can shed some light on the solutions to addressing the source of AI-generated images, as well as to prevent the misuse of text-to-image generative models.
△ Less
Submitted 3 March, 2024;
originally announced March 2024.
-
Gender Bias in Large Language Models across Multiple Languages
Authors:
**man Zhao,
Yitian Ding,
Chen Jia,
Yining Wang,
Zifan Qian
Abstract:
With the growing deployment of large language models (LLMs) across various applications, assessing the influence of gender biases embedded in LLMs becomes crucial. The topic of gender bias within the realm of natural language processing (NLP) has gained considerable focus, particularly in the context of English. Nonetheless, the investigation of gender bias in languages other than English is still…
▽ More
With the growing deployment of large language models (LLMs) across various applications, assessing the influence of gender biases embedded in LLMs becomes crucial. The topic of gender bias within the realm of natural language processing (NLP) has gained considerable focus, particularly in the context of English. Nonetheless, the investigation of gender bias in languages other than English is still relatively under-explored and insufficiently analyzed. In this work, We examine gender bias in LLMs-generated outputs for different languages. We use three measurements: 1) gender bias in selecting descriptive words given the gender-related context. 2) gender bias in selecting gender-related pronouns (she/he) given the descriptive words. 3) gender bias in the topics of LLM-generated dialogues. We investigate the outputs of the GPT series of LLMs in various languages using our three measurement methods. Our findings revealed significant gender biases across all the languages we examined.
△ Less
Submitted 29 February, 2024;
originally announced March 2024.
-
DAGnosis: Localized Identification of Data Inconsistencies using Structures
Authors:
Nicolas Huynh,
Jeroen Berrevoets,
Nabeel Seedat,
Jonathan Crabbé,
Zhaozhi Qian,
Mihaela van der Schaar
Abstract:
Identification and appropriate handling of inconsistencies in data at deployment time is crucial to reliably use machine learning models. While recent data-centric methods are able to identify such inconsistencies with respect to the training set, they suffer from two key limitations: (1) suboptimality in settings where features exhibit statistical independencies, due to their usage of compressive…
▽ More
Identification and appropriate handling of inconsistencies in data at deployment time is crucial to reliably use machine learning models. While recent data-centric methods are able to identify such inconsistencies with respect to the training set, they suffer from two key limitations: (1) suboptimality in settings where features exhibit statistical independencies, due to their usage of compressive representations and (2) lack of localization to pin-point why a sample might be flagged as inconsistent, which is important to guide future data collection. We solve these two fundamental limitations using directed acyclic graphs (DAGs) to encode the training set's features probability distribution and independencies as a structure. Our method, called DAGnosis, leverages these structural interactions to bring valuable and insightful data-centric conclusions. DAGnosis unlocks the localization of the causes of inconsistencies on a DAG, an aspect overlooked by previous approaches. Moreover, we show empirically that leveraging these interactions (1) leads to more accurate conclusions in detecting inconsistencies, as well as (2) provides more detailed insights into why some samples are flagged.
△ Less
Submitted 28 February, 2024; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Purified and Unified Steganographic Network
Authors:
Guobiao Li,
Sheng Li,
Zicong Luo,
Zhenxing Qian,
Xinpeng Zhang
Abstract:
Steganography is the art of hiding secret data into the cover media for covert communication. In recent years, more and more deep neural network (DNN)-based steganographic schemes are proposed to train steganographic networks for secret embedding and recovery, which are shown to be promising. Compared with the handcrafted steganographic tools, steganographic networks tend to be large in size. It r…
▽ More
Steganography is the art of hiding secret data into the cover media for covert communication. In recent years, more and more deep neural network (DNN)-based steganographic schemes are proposed to train steganographic networks for secret embedding and recovery, which are shown to be promising. Compared with the handcrafted steganographic tools, steganographic networks tend to be large in size. It raises concerns on how to imperceptibly and effectively transmit these networks to the sender and receiver to facilitate the covert communication. To address this issue, we propose in this paper a Purified and Unified Steganographic Network (PUSNet). It performs an ordinary machine learning task in a purified network, which could be triggered into steganographic networks for secret embedding or recovery using different keys. We formulate the construction of the PUSNet into a sparse weight filling problem to flexibly switch between the purified and steganographic networks. We further instantiate our PUSNet as an image denoising network with two steganographic networks concealed for secret image embedding and recovery. Comprehensive experiments demonstrate that our PUSNet achieves good performance on secret image embedding, secret image recovery, and image denoising in a single architecture. It is also shown to be capable of imperceptibly carrying the steganographic networks in a purified network. Code is available at \url{https://github.com/albblgb/PUSNet}
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
The quark flavor-violating ALPs in light of B mesons and hadron colliders
Authors:
Tong Li,
Zhuoni Qian,
Michael A. Schmidt,
Man Yuan
Abstract:
The axion-like particle (ALP) may induce flavor-changing neutral currents (FCNCs) when their Peccei-Quinn charges are not generation universal. The search for flavor-violating ALP couplings with a bottom quark so far focused on FCNC processes of $B$ mesons at low energies. The recent measurements of $B\to K +X$ rare decays place stringent bounds on the quark flavor violations of a light ALP in dif…
▽ More
The axion-like particle (ALP) may induce flavor-changing neutral currents (FCNCs) when their Peccei-Quinn charges are not generation universal. The search for flavor-violating ALP couplings with a bottom quark so far focused on FCNC processes of $B$ mesons at low energies. The recent measurements of $B\to K +X$ rare decays place stringent bounds on the quark flavor violations of a light ALP in different decay modes. In this work we propose a novel direct search for bottom flavor-violating interaction of a heavy ALP at the LHC and its upgrades, namely QCD production of an ALP associated with one $b$ jet and one light jet $p~p\to b~j~a$. We consider the decay of the ALP to photons, muons and invisible ALP decays. The Boosted Decision Tree (BDT) algorithm is used to analyze the events and we train the BDT classifier by feeding in the kinematic observables of signal and backgrounds. Finally, we show the complementarity between the search prospects of hadron colliders and the low-energy $B$ meson constraints from $B$ meson mixing and $B$ meson decays to a light ALP.
△ Less
Submitted 26 April, 2024; v1 submitted 21 February, 2024;
originally announced February 2024.
-
AFPR-CIM: An Analog-Domain Floating-Point RRAM-based Compute-In-Memory Architecture with Dynamic Range Adaptive FP-ADC
Authors:
Haobo Liu,
Zhengyang Qian,
Wei Wu,
Hongwei Ren,
Zhiwei Liu,
Leibin Ni
Abstract:
Power consumption has become the major concern in neural network accelerators for edge devices. The novel non-volatile-memory (NVM) based computing-in-memory (CIM) architecture has shown great potential for better energy efficiency. However, most of the recent NVM-CIM solutions mainly focus on fixed-point calculation and are not applicable to floating-point (FP) processing. In this paper, we propo…
▽ More
Power consumption has become the major concern in neural network accelerators for edge devices. The novel non-volatile-memory (NVM) based computing-in-memory (CIM) architecture has shown great potential for better energy efficiency. However, most of the recent NVM-CIM solutions mainly focus on fixed-point calculation and are not applicable to floating-point (FP) processing. In this paper, we propose an analog-domain floating-point CIM architecture (AFPR-CIM) based on resistive random-access memory (RRAM). A novel adaptive dynamic-range FP-ADC is designed to convert the analog computation results into FP codes. Output current with high dynamic range is converted to a normalized voltage range for readout, to prevent precision loss at low power consumption. Moreover, a novel FP-DAC is also implemented which reconstructs FP digital codes into analog values to perform analog computation. The proposed AFPR-CIM architecture enables neural network acceleration with FP8 (E2M5) activation for better accuracy and energy efficiency. Evaluation results show that AFPR-CIM can achieve 19.89 TFLOPS/W energy efficiency and 1474.56 GOPS throughput. Compared to traditional FP8 accelerator, digital FP-CIM, and analog INT8-CIM, this work achieves 4.135x, 5.376x, and 2.841x energy efficiency enhancement, respectively.
△ Less
Submitted 21 February, 2024;
originally announced February 2024.
-
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem
Authors:
Xingyu Li,
Zheng Zhang,
Zhiyun Qian,
Trent Jaeger,
Chengyu Song
Abstract:
Open-source software is increasingly reused, complicating the process of patching to repair bugs. In the case of Linux, a distinct ecosystem has formed, with Linux mainline serving as the upstream, stable or long-term-support (LTS) systems forked from mainline, and Linux distributions, such as Ubuntu and Android, as downstreams forked from stable or LTS systems for end-user use. Ideally, when a pa…
▽ More
Open-source software is increasingly reused, complicating the process of patching to repair bugs. In the case of Linux, a distinct ecosystem has formed, with Linux mainline serving as the upstream, stable or long-term-support (LTS) systems forked from mainline, and Linux distributions, such as Ubuntu and Android, as downstreams forked from stable or LTS systems for end-user use. Ideally, when a patch is committed in the Linux upstream, it should not introduce new bugs and be ported to all the applicable downstream branches in a timely fashion. However, several concerns have been expressed in prior work about the responsiveness of patch porting in this Linux ecosystem. In this paper, we mine the software repositories to investigate a range of Linux distributions in combination with Linux stable and LTS, and find diverse patch porting strategies and competence levels that help explain the phenomenon. Furthermore, we show concretely using three metrics, i.e., patch delay, patch rate, and bug inheritance ratio, that different porting strategies have different tradeoffs. We find that hinting tags(e.g., Cc stable tags and fixes tags) are significantly important to the prompt patch porting, but it is noteworthy that a substantial portion of patches remain devoid of these indicative tags. Finally, we offer recommendations based on our analysis of the general patch flow, e.g., interactions among various stakeholders in the ecosystem and automatic generation of hinting tags, as well as tailored suggestions for specific porting strategies.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
PandaX-xT: a Multi-ten-tonne Liquid Xenon Observatory at the China **** Underground Laboratory
Authors:
PandaX Collaboration,
Abdusalam Abdukerim,
Zihao Bo,
Wei Chen,
Xun Chen,
Chen Cheng,
Zhaokan Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Lisheng Geng,
Karl Giboni,
Linhui Gu,
Xunan Guo,
Xuyuan Guo,
Zhichao Guo,
Chencheng Han,
Ke Han,
Changda He,
**rong He,
Di Huang,
Junting Huang,
Zhou Huang,
Ruquan Hou,
Yu Hou
, et al. (68 additional authors not shown)
Abstract:
We propose a major upgrade to the existing PandaX-4T experiment in the China **** Underground Laboratory. The new experiment, PandaX-xT, will be a multi-ten-tonne liquid xenon, ultra-low background, and general-purpose observatory. The full-scaled PandaX-xT contains a 43-tonne liquid xenon active target. Such an experiment will significantly advance our fundamental understanding of particle phy…
▽ More
We propose a major upgrade to the existing PandaX-4T experiment in the China **** Underground Laboratory. The new experiment, PandaX-xT, will be a multi-ten-tonne liquid xenon, ultra-low background, and general-purpose observatory. The full-scaled PandaX-xT contains a 43-tonne liquid xenon active target. Such an experiment will significantly advance our fundamental understanding of particle physics and astrophysics. The sensitivity of dark matter direct detection will be improved by nearly two orders of magnitude compared to the current best limits, approaching the so-called "neutrino floor" for a dark matter mass above 10 GeV/$c^2$, providing a decisive test to the Weakly Interacting Massive Particle paradigm. By searching for the neutrinoless double beta decay of $^{136}$Xe isotope in the detector, the effective Majorana neutrino mass can be measured to a [10 -- 41] meV/$c^2$ sensitivity, providing a key test to the Dirac/Majorana nature of neutrino s. Astrophysical neutrinos and other ultra-rare interactions can also be measured and searched for with an unprecedented background level, opening up new windows of discovery. Depending on the findings, PandaX-xT will seek the next stage upgrade utilizing isotopic separation on natural xenon.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Dirac operators and field equations of the gravitational field and matter fields
Authors:
Zhongmin Qian
Abstract:
Dirac operators on curved space-times are introduced with the help of a new point-view that observers have to be included in the formulation of natural laws. The class of Dirac operators are Lorentz invariant in the sense that the transformation rule is specified under diffeomorphisms of the space-time which preserve the time orientation and the gravitational field. Moreover these Dirac operators,…
▽ More
Dirac operators on curved space-times are introduced with the help of a new point-view that observers have to be included in the formulation of natural laws. The class of Dirac operators are Lorentz invariant in the sense that the transformation rule is specified under diffeomorphisms of the space-time which preserve the time orientation and the gravitational field. Moreover these Dirac operators, like the original Dirac's operator with the special relativity, satisfy the Hamiltonian relation required by the general theory of relativity up to a correction due to the setup of a reference frame. In order to generalise (or discover) Dirac operators, which have been an important building block in the quantum field theories (QFTs), to curved space-times, we bring observers (which are elements of the principal orthonormal bundle over the space-time with its structure group being the proper Lorentz group) into the description of Fermion fields in the presence of a gravitational field. As a consequence field equations combining the gravitational field and matter fields may be formulated. This work suggests that observational effects (due to the setup of references) in the presence of a strong gravitational field, i.e. matter, may be unavoidable.
△ Less
Submitted 3 February, 2024;
originally announced February 2024.
-
EmoSpeaker: One-shot Fine-grained Emotion-Controlled Talking Face Generation
Authors:
Guanwen Feng,
Haoran Cheng,
Yunan Li,
Zhiyuan Ma,
Chaoneng Li,
Zhihao Qian,
Qiguang Miao,
Chi-Man Pun
Abstract:
Implementing fine-grained emotion control is crucial for emotion generation tasks because it enhances the expressive capability of the generative model, allowing it to accurately and comprehensively capture and express various nuanced emotional states, thereby improving the emotional quality and personalization of generated content. Generating fine-grained facial animations that accurately portray…
▽ More
Implementing fine-grained emotion control is crucial for emotion generation tasks because it enhances the expressive capability of the generative model, allowing it to accurately and comprehensively capture and express various nuanced emotional states, thereby improving the emotional quality and personalization of generated content. Generating fine-grained facial animations that accurately portray emotional expressions using only a portrait and an audio recording presents a challenge. In order to address this challenge, we propose a visual attribute-guided audio decoupler. This enables the obtention of content vectors solely related to the audio content, enhancing the stability of subsequent lip movement coefficient predictions. To achieve more precise emotional expression, we introduce a fine-grained emotion coefficient prediction module. Additionally, we propose an emotion intensity control method using a fine-grained emotion matrix. Through these, effective control over emotional expression in the generated videos and finer classification of emotion intensity are accomplished. Subsequently, a series of 3DMM coefficient generation networks are designed to predict 3D coefficients, followed by the utilization of a rendering network to generate the final video. Our experimental results demonstrate that our proposed method, EmoSpeaker, outperforms existing emotional talking face generation methods in terms of expression variation and lip synchronization. Project page: https://peterfanfan.github.io/EmoSpeaker/
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
Authors:
**meng Zhou,
Jiayi Hu,
Ziyue Pan,
Jiaxun Zhu,
Guoren Li,
Wenbo Shen,
Yulei Sui,
Zhiyun Qian
Abstract:
The widespread deployment of control-flow integrity has propelled non-control data attacks into the mainstream. In the domain of OS kernel exploits, by corrupting critical non-control data, local attackers can directly gain root access or privilege escalation without hijacking the control flow. As a result, OS kernels have been restricting the availability of such non-control data. This forces att…
▽ More
The widespread deployment of control-flow integrity has propelled non-control data attacks into the mainstream. In the domain of OS kernel exploits, by corrupting critical non-control data, local attackers can directly gain root access or privilege escalation without hijacking the control flow. As a result, OS kernels have been restricting the availability of such non-control data. This forces attackers to continue to search for more exploitable non-control data in OS kernels. However, discovering unknown non-control data can be daunting because they are often tied heavily to semantics and lack universal patterns.
We make two contributions in this paper: (1) discover critical non-control objects in the file subsystem and (2) analyze their exploitability. This work represents the first study, with minimal domain knowledge, to semi-automatically discover and evaluate exploitable non-control data within the file subsystem of the Linux kernel. Our solution utilizes a custom analysis and testing framework that statically and dynamically identifies promising candidate objects. Furthermore, we categorize these discovered objects into types that are suitable for various exploit strategies, including a novel strategy necessary to overcome the defense that isolates many of these objects. These objects have the advantage of being exploitable without requiring KASLR, thus making the exploits simpler and more reliable. We use 18 real-world CVEs to evaluate the exploitability of the file system objects using various exploit strategies. We develop 10 end-to-end exploits using a subset of CVEs against the kernel with all state-of-the-art mitigations enabled.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
Unveiling the Power of Self-supervision for Multi-view Multi-human Association and Tracking
Authors:
Wei Feng,
Feifan Wang,
Ruize Han,
Zekun Qian,
Song Wang
Abstract:
Multi-view multi-human association and tracking (MvMHAT), is a new but important problem for multi-person scene video surveillance, aiming to track a group of people over time in each view, as well as to identify the same person across different views at the same time, which is different from previous MOT and multi-camera MOT tasks only considering the over-time human tracking. This way, the video…
▽ More
Multi-view multi-human association and tracking (MvMHAT), is a new but important problem for multi-person scene video surveillance, aiming to track a group of people over time in each view, as well as to identify the same person across different views at the same time, which is different from previous MOT and multi-camera MOT tasks only considering the over-time human tracking. This way, the videos for MvMHAT require more complex annotations while containing more information for self learning. In this work, we tackle this problem with a self-supervised learning aware end-to-end network. Specifically, we propose to take advantage of the spatial-temporal self-consistency rationale by considering three properties of reflexivity, symmetry and transitivity. Besides the reflexivity property that naturally holds, we design the self-supervised learning losses based on the properties of symmetry and transitivity, for both appearance feature learning and assignment matrix optimization, to associate the multiple humans over time and across views. Furthermore, to promote the research on MvMHAT, we build two new large-scale benchmarks for the network training and testing of different algorithms. Extensive experiments on the proposed benchmarks verify the effectiveness of our method. We have released the benchmark and code to the public.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
Adaptive Experiment Design with Synthetic Controls
Authors:
Alihan Hüyük,
Zhaozhi Qian,
Mihaela van der Schaar
Abstract:
Clinical trials are typically run in order to understand the effects of a new treatment on a given population of patients. However, patients in large populations rarely respond the same way to the same treatment. This heterogeneity in patient responses necessitates trials that investigate effects on multiple subpopulations - especially when a treatment has marginal or no benefit for the overall po…
▽ More
Clinical trials are typically run in order to understand the effects of a new treatment on a given population of patients. However, patients in large populations rarely respond the same way to the same treatment. This heterogeneity in patient responses necessitates trials that investigate effects on multiple subpopulations - especially when a treatment has marginal or no benefit for the overall population but might have significant benefit for a particular subpopulation. Motivated by this need, we propose Syntax, an exploratory trial design that identifies subpopulations with positive treatment effect among many subpopulations. Syntax is sample efficient as it (i) recruits and allocates patients adaptively and (ii) estimates treatment effects by forming synthetic controls for each subpopulation that combines control samples from other subpopulations. We validate the performance of Syntax and provide insights into when it might have an advantage over conventional trial designs through experiments.
△ Less
Submitted 9 February, 2024; v1 submitted 30 January, 2024;
originally announced January 2024.
-
SyzRetrospector: A Large-Scale Retrospective Study of Syzbot
Authors:
Joseph Bursey,
Ardalan Amiri Sani,
Zhiyun Qian
Abstract:
Over the past 6 years, Syzbot has fuzzed the Linux kernel day and night to report over 5570 bugs, of which 4604 have been patched [11]. While this is impressive, we have found the average time to find a bug is over 405 days. Moreover, we have found that current metrics commonly used, such as time-to-find and number of bugs found, are inaccurate in evaluating Syzbot since bugs often spend the major…
▽ More
Over the past 6 years, Syzbot has fuzzed the Linux kernel day and night to report over 5570 bugs, of which 4604 have been patched [11]. While this is impressive, we have found the average time to find a bug is over 405 days. Moreover, we have found that current metrics commonly used, such as time-to-find and number of bugs found, are inaccurate in evaluating Syzbot since bugs often spend the majority of their lives hidden from the fuzzer. In this paper, we set out to better understand and quantify Syzbot's performance and improvement in finding bugs. Our tool, SyzRetrospector, takes a different approach to evaluating Syzbot by finding the earliest that Syzbot was capable of finding a bug, and why that bug was revealed. We use SyzRetrospector on a large scale to analyze 559 bugs and find that bugs are hidden for an average of 331.17 days before Syzbot is even able to find them. We further present findings on the behaviors of revealing factors, how some bugs are harder to reveal than others, the trends in delays over the past 6 years, and how bug location relates to delays. We also provide key takeaways for improving Syzbot's delays.
△ Less
Submitted 21 January, 2024;
originally announced January 2024.
-
Measurement of Solar $pp$ Neutrino Flux using Electron Recoil Data from PandaX-4T Commissioning Run
Authors:
PandaX Collaboration,
Xiaoying Lu,
Abdusalam Abdukerim,
Zihao Bo,
Wei Chen,
Xun Chen,
Yunhua Chen,
Chen Cheng,
Zhaokan Cheng,
Xiangyi Cui,
Yingjie Fan,
Deqing Fang,
Lisheng Geng,
Karl Giboni,
Xuyuan Guo,
Chencheng Han,
Ke Han,
Changda He,
**rong He,
Di Huang,
Junting Huang,
Zhou Huang,
Ruquan Hou,
Yu Hou,
Xiangdong Ji
, et al. (67 additional authors not shown)
Abstract:
The proton-proton ($pp$) fusion chain dominates the neutrino production from the Sun. The uncertainty of the predicted $pp$ neutrino flux is at the sub-percent level, whereas that of the best measurement is $\mathcal{O}(10\%)$. In this paper, we present the first result to measure the solar $pp$ neutrinos in the electron recoil energy range from 24 to 144 keV, using the PandaX-4T commissioning dat…
▽ More
The proton-proton ($pp$) fusion chain dominates the neutrino production from the Sun. The uncertainty of the predicted $pp$ neutrino flux is at the sub-percent level, whereas that of the best measurement is $\mathcal{O}(10\%)$. In this paper, we present the first result to measure the solar $pp$ neutrinos in the electron recoil energy range from 24 to 144 keV, using the PandaX-4T commissioning data with 0.63 tonne$\times$year exposure. The $pp$ neutrino flux is determined to be $(8.0 \pm 3.9 \,{\rm{(stat)}} \pm 10.0 \,{\rm{(syst)}} )\times 10^{10}\, $$\rm{s}^{-1} \rm{cm}^{-2}$, consistent with Standard Solar Model and existing measurements, corresponding to a flux upper limit of $23.3\times 10^{10}\, $$\rm{s}^{-1} \rm{cm}^{-2}$ at 90\% C.L..
△ Less
Submitted 2 July, 2024; v1 submitted 13 January, 2024;
originally announced January 2024.
-
One-dimensional Multiferroic Semiconductor WOI3: Unconventional Anisotropic d^1 Rule and Bulk Photovoltaic Effect
Authors:
Zhihao Gong,
Yechen Xun,
Zhuang Qian,
Kai Chang,
**gshan Qi,
Hua Wang
Abstract:
The pursuit of multiferroic magnetoelectrics, combining simultaneous ferroelectric and magnetic orders, remains a central focus in condensed matter physics. Here we report the centrosymmetric, one-dimensional (1D) antiferromagnetic WOI$_3$ undergoes a strain-induced ferroelectric distortion. The paraelectric-ferroelectric transition is originated from the unconventional anisotropic $d^1$ mechanism…
▽ More
The pursuit of multiferroic magnetoelectrics, combining simultaneous ferroelectric and magnetic orders, remains a central focus in condensed matter physics. Here we report the centrosymmetric, one-dimensional (1D) antiferromagnetic WOI$_3$ undergoes a strain-induced ferroelectric distortion. The paraelectric-ferroelectric transition is originated from the unconventional anisotropic $d^1$ mechanism, where an unpaired d electron of each W$^{5+}$ ion contributes to magnetic orders. Employing a Heisenberg model with Dzyaloshinskii-Moriya interaction, we predict an antiferromagnetic spin configuration as the paraelectric ground state, transitioning to a ferroelectric phase with noncollinear spin arrangement under uniaxial strain. The ferroelectric polarization and noncollinear spin arrangement can be manipulated by varying the applied strain. While the energy barriers for switching ferroelectric polarizations with magnetic orders are on the order of a few dozen of meV, the shift current bulk photovoltaic effect (BPVE) exhibits remarkable differences, providing a precise and valuable tool for experimentally probing the interplay of ferroelectric and magnetic orders in 1D WOI$_3$.
△ Less
Submitted 13 March, 2024; v1 submitted 7 January, 2024;
originally announced January 2024.
-
Object-oriented backdoor attack against image captioning
Authors:
Meiling Li,
Nan Zhong,
Xinpeng Zhang,
Zhenxing Qian,
Sheng Li
Abstract:
Backdoor attack against image classification task has been widely studied and proven to be successful, while there exist little research on the backdoor attack against vision-language models. In this paper, we explore backdoor attack towards image captioning models by poisoning training data. Assuming the attacker has total access to the training dataset, and cannot intervene in model construction…
▽ More
Backdoor attack against image classification task has been widely studied and proven to be successful, while there exist little research on the backdoor attack against vision-language models. In this paper, we explore backdoor attack towards image captioning models by poisoning training data. Assuming the attacker has total access to the training dataset, and cannot intervene in model construction or training process. Specifically, a portion of benign training samples is randomly selected to be poisoned. Afterwards, considering that the captions are usually unfolded around objects in an image, we design an object-oriented method to craft poisons, which aims to modify pixel values by a slight range with the modification number proportional to the scale of the current detected object region. After training with the poisoned data, the attacked model behaves normally on benign images, but for poisoned images, the model will generate some sentences irrelevant to the given image. The attack controls the model behavior on specific test images without sacrificing the generation performance on benign test images. Our method proves the weakness of image captioning models to backdoor attack and we hope this work can raise the awareness of defending against backdoor attack in the image captioning field.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
Fact-checking based fake news detection: a review
Authors:
Yuzhou Yang,
Yangming Zhou,
Qichao Ying,
Zhenxing Qian,
Dan Zeng,
Liang Liu
Abstract:
This paper reviews and summarizes the research results on fact-based fake news from the perspectives of tasks and problems, algorithm strategies, and datasets. First, the paper systematically explains the task definition and core problems of fact-based fake news detection. Second, the paper summarizes the existing detection methods based on the algorithm principles. Third, the paper analyzes the c…
▽ More
This paper reviews and summarizes the research results on fact-based fake news from the perspectives of tasks and problems, algorithm strategies, and datasets. First, the paper systematically explains the task definition and core problems of fact-based fake news detection. Second, the paper summarizes the existing detection methods based on the algorithm principles. Third, the paper analyzes the classic and newly proposed datasets in the field, and summarizes the experimental results on each dataset. Finally, the paper summarizes the advantages and disadvantages of existing methods, proposes several challenges that methods in this field may face, and looks forward to the next stage of research. It is hoped that this paper will provide reference for subsequent work in the field.
△ Less
Submitted 3 January, 2024;
originally announced January 2024.
-
PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning
Authors:
Xuntao Liu,
Yuzhou Yang,
Qichao Ying,
Zhenxing Qian,
Xinpeng Zhang,
Sheng Li
Abstract:
Deceptive images can be shared in seconds with social networking services, posing substantial risks. Tampering traces, such as boundary artifacts and high-frequency information, have been significantly emphasized by massive networks in the Image Manipulation Localization (IML) field. However, they are prone to image post-processing operations, which limit the generalization and robustness of exist…
▽ More
Deceptive images can be shared in seconds with social networking services, posing substantial risks. Tampering traces, such as boundary artifacts and high-frequency information, have been significantly emphasized by massive networks in the Image Manipulation Localization (IML) field. However, they are prone to image post-processing operations, which limit the generalization and robustness of existing methods. We present a novel Prompt-IML framework. We observe that humans tend to discern the authenticity of an image based on both semantic and high-frequency information, inspired by which, the proposed framework leverages rich semantic knowledge from pre-trained visual foundation models to assist IML. We are the first to design a framework that utilizes visual foundation models specially for the IML task. Moreover, we design a Feature Alignment and Fusion module to align and fuse features of semantic features with high-frequency features, which aims at locating tampered regions from multiple perspectives. Experimental results demonstrate that our model can achieve better performance on eight typical fake image datasets and outstanding robustness.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.
-
From Covert Hiding to Visual Editing: Robust Generative Video Steganography
Authors:
Xueying Mao,
Xiaoxiao Hu,
Wanli Peng,
Zhenliang Gan,
Qichao Ying,
Zhenxing Qian,
Sheng Li,
Xinpeng Zhang
Abstract:
Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process. Although existing traditional video steganography methods display a certain level of security and embedding capacity, they lack adequate robustness against comm…
▽ More
Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process. Although existing traditional video steganography methods display a certain level of security and embedding capacity, they lack adequate robustness against common distortions in online social networks (OSNs). In this paper, we introduce an end-to-end robust generative video steganography network (RoGVS), which achieves visual editing by modifying semantic feature of videos to embed secret message. We employ face-swap** scenario to showcase the visual editing effects. We first design a secret message embedding module to adaptively hide secret message into the semantic feature of videos. Extensive experiments display that the proposed RoGVS method applied to facial video datasets demonstrate its superiority over existing video and image steganography techniques in terms of both robustness and capacity.
△ Less
Submitted 31 December, 2023;
originally announced January 2024.